Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2023-39197
Vulnerability from cvelistv5
Published
2024-01-23 03:04
Modified
2025-02-07 04:16
Severity ?
EPSS score ?
0.03%
(0.06467)
Summary
An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-39197 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2218342 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-39197 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2218342 | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Red Hat | Red Hat Enterprise Linux 6 |
cpe:/o:redhat:enterprise_linux:6 |
|||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T18:02:05.375Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vdb-entry", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/security/cve/CVE-2023-39197", }, { name: "RHBZ#2218342", tags: [ "issue-tracking", "x_refsource_REDHAT", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2218342", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:6", ], defaultStatus: "unknown", packageName: "kernel", product: "Red Hat Enterprise Linux 6", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:7", ], defaultStatus: "unknown", packageName: "kernel", product: "Red Hat Enterprise Linux 7", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:7", ], defaultStatus: "unknown", packageName: "kernel-rt", product: "Red Hat Enterprise Linux 7", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:8", ], defaultStatus: "unaffected", packageName: "kernel", product: "Red Hat Enterprise Linux 8", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:8", ], defaultStatus: "unaffected", packageName: "kernel-rt", product: "Red Hat Enterprise Linux 8", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:9", ], defaultStatus: "unaffected", packageName: "kernel", product: "Red Hat Enterprise Linux 9", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:9", ], defaultStatus: "unaffected", packageName: "kernel-rt", product: "Red Hat Enterprise Linux 9", vendor: "Red Hat", }, ], datePublic: "2023-11-08T00:00:00.000Z", descriptions: [ { lang: "en", value: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", }, ], metrics: [ { other: { content: { namespace: "https://access.redhat.com/security/updates/classification/", value: "Moderate", }, type: "Red Hat severity rating", }, }, { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "Out-of-bounds Read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-07T04:16:16.770Z", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "vdb-entry", "x_refsource_REDHAT", ], url: "https://access.redhat.com/security/cve/CVE-2023-39197", }, { name: "RHBZ#2218342", tags: [ "issue-tracking", "x_refsource_REDHAT", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2218342", }, ], timeline: [ { lang: "en", time: "2023-06-28T00:00:00+00:00", value: "Reported to Red Hat.", }, { lang: "en", time: "2023-11-08T00:00:00+00:00", value: "Made public.", }, ], title: "Kernel: dccp: conntrack out-of-bounds read in nf_conntrack_dccp_packet()", x_redhatCweChain: "CWE-125: Out-of-bounds Read", }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2023-39197", datePublished: "2024-01-23T03:04:26.950Z", dateReserved: "2023-07-25T17:04:34.810Z", dateUpdated: "2025-02-07T04:16:16.770Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2023-39197\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-01-23T03:15:11.683\",\"lastModified\":\"2024-11-21T08:14:53.713\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.\"},{\"lang\":\"es\",\"value\":\"Se encontró una vulnerabilidad de lectura fuera de los límites en Netfilter Connection Tracking (conntrack) en el kernel de Linux. Esta falla permite que un usuario remoto revele información confidencial a través del protocolo DCCP.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.26\",\"versionEndExcluding\":\"5.4.251\",\"matchCriteriaId\":\"79658A41-FEEA-42AF-93D9-A85F7CF2123A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.188\",\"matchCriteriaId\":\"43CAE50A-4A6C-488E-813C-F8DB77C13C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.121\",\"matchCriteriaId\":\"EC77775B-EC31-4966-966C-1286C02B2A85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.39\",\"matchCriteriaId\":\"9BD1D4A1-304D-4187-8178-6D7C0050B1AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.3.13\",\"matchCriteriaId\":\"95CB4836-7F5D-4C20-B025-8E046EC87B78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4\",\"versionEndExcluding\":\"6.4.4\",\"matchCriteriaId\":\"6AB81046-CB69-4115-924C-963B37C41385\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-39197\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2218342\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-39197\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2218342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}", }, }
wid-sec-w-2023-2864
Vulnerability from csaf_certbund
Published
2023-11-08 23:00
Modified
2024-07-18 22:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um Informationen offenzulegen, seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- Linux
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um Informationen offenzulegen, seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand auszulösen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2864 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2864.json", }, { category: "self", summary: "WID-SEC-2023-2864 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2864", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-4 vom 2024-01-05", url: "https://ubuntu.com/security/notices/USN-6549-4", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-1 vom 2023-12-12", url: "https://ubuntu.com/security/notices/USN-6549-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0622-1 vom 2024-02-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6534-2 vom 2023-12-12", url: "https://ubuntu.com/security/notices/USN-6534-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-2 vom 2023-12-12", url: "https://ubuntu.com/security/notices/USN-6549-2", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-045 vom 2024-01-09", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-045.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2024-2391 vom 2024-01-10", url: "https://alas.aws.amazon.com/AL2/ALAS-2024-2391.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-5 vom 2024-01-10", url: "https://ubuntu.com/security/notices/USN-6549-5", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4782-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4784-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6534-3 vom 2023-12-13", url: "https://ubuntu.com/security/notices/USN-6534-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4811-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4783-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4810-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-3 vom 2023-12-13", url: "https://ubuntu.com/security/notices/USN-6549-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4730-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4732-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4735-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4731-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4733-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017383.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4734-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017379.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4882-1 vom 2023-12-15", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4883-1 vom 2023-12-15", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0666-1 vom 2024-02-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0662-1 vom 2024-02-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018065.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0655-1 vom 2024-02-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0705-1 vom 2024-02-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018067.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0698-1 vom 2024-02-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0112-1 vom 2024-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0727-1 vom 2024-02-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-047 vom 2024-01-23", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-047.html", }, { category: "external", summary: "Red Hat Bugzilla – Bug 2218342", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-39197", }, { category: "external", summary: "RedHat Customer Portal für CVE-2023-39197 vom 2023-11-08", url: "https://access.redhat.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "Red Hat Bugzilla – Bug 2218332", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-39198", }, { category: "external", summary: "RedHat Customer Portal für CVE-2023-39198 vom 2023-11-08", url: "https://access.redhat.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "Ubuntu Security Notice USN-6534-1 vom 2023-12-06", url: "https://ubuntu.com/security/notices/USN-6534-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6700-1 vom 2024-03-19", url: "https://ubuntu.com/security/notices/USN-6700-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6701-1 vom 2024-03-19", url: "https://ubuntu.com/security/notices/USN-6701-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6701-2 vom 2024-03-20", url: "https://ubuntu.com/security/notices/USN-6701-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6700-2 vom 2024-03-21", url: "https://ubuntu.com/security/notices/USN-6700-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6701-3 vom 2024-03-26", url: "https://ubuntu.com/security/notices/USN-6701-3", }, { category: "external", summary: "Ubuntu Security Notice USN-6701-4 vom 2024-04-09", url: "https://ubuntu.com/security/notices/USN-6701-4", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:2394 vom 2024-04-30", url: "https://access.redhat.com/errata/RHSA-2024:2394", }, { category: "external", summary: "Dell Security Advisory DSA-2024-198 vom 2024-05-08", url: "https://www.dell.com/support/kbdoc/000224827/dsa-2024-=", }, { category: "external", summary: "IBM Security Bulletin 7152469 vom 2024-05-15", url: "https://www.ibm.com/support/pages/node/7152469", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:3138 vom 2024-05-22", url: "https://access.redhat.com/errata/RHSA-2024:3138", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:2950 vom 2024-05-22", url: "https://access.redhat.com/errata/RHSA-2024:2950", }, { category: "external", summary: "IBM Security Bulletin 7156774 vom 2024-06-07", url: "https://www.ibm.com/support/pages/node/7156774", }, { category: "external", summary: "Debian Security Advisory DLA-3841 vom 2024-06-25", url: "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", }, { category: "external", summary: "Dell Security Advisory DSA-2024-239 vom 2024-07-18", url: "https://www.dell.com/support/kbdoc/de-de/000227051/dsa-2024-239-security-update-dell-ecs-3-8-1-1-for-multiple-security-vulnerabilities", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen", tracking: { current_release_date: "2024-07-18T22:00:00.000+00:00", generator: { date: "2024-08-15T18:01:22.061+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2864", initial_release_date: "2023-11-08T23:00:00.000+00:00", revision_history: [ { date: "2023-11-08T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-12-05T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-12-11T23:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-12-12T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-12-13T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE und Ubuntu aufgenommen", }, { date: "2023-12-14T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-12-17T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-01-07T23:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-01-09T23:00:00.000+00:00", number: "9", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2024-01-10T23:00:00.000+00:00", number: "10", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-01-17T23:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-01-22T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2024-02-26T23:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-02-28T23:00:00.000+00:00", number: "14", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-02-29T23:00:00.000+00:00", number: "15", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-03-18T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-03-20T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-03-21T23:00:00.000+00:00", number: "18", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-03-25T23:00:00.000+00:00", number: "19", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-04-09T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-04-29T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-05-07T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Dell aufgenommen", }, { date: "2024-05-15T22:00:00.000+00:00", number: "23", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-05-21T22:00:00.000+00:00", number: "24", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-06-09T22:00:00.000+00:00", number: "25", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-06-25T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-07-18T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Dell aufgenommen", }, ], status: "final", version: "27", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.1", product: { name: "Dell ECS <3.8.1.1", product_id: "T036366", }, }, ], category: "product_name", name: "ECS", }, { branches: [ { category: "product_version", name: "virtual", product: { name: "Dell NetWorker virtual", product_id: "T034583", product_identification_helper: { cpe: "cpe:/a:dell:networker:virtual", }, }, }, ], category: "product_name", name: "NetWorker", }, ], category: "vendor", name: "Dell", }, { branches: [ { category: "product_name", name: "EMC Avamar", product: { name: "EMC Avamar", product_id: "T014381", product_identification_helper: { cpe: "cpe:/a:emc:avamar:-", }, }, }, ], category: "vendor", name: "EMC", }, { branches: [ { category: "product_name", name: "IBM QRadar SIEM", product: { name: "IBM QRadar SIEM", product_id: "T021415", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:-", }, }, }, { branches: [ { category: "product_version", name: "12", product: { name: "IBM Security Guardium 12.0", product_id: "T031092", product_identification_helper: { cpe: "cpe:/a:ibm:security_guardium:12.0", }, }, }, ], category: "product_name", name: "Security Guardium", }, ], category: "vendor", name: "IBM", }, { branches: [ { branches: [ { category: "product_version_range", name: "<6.4.4", product: { name: "Open Source Linux Kernel <6.4.4", product_id: "T031013", }, }, { category: "product_version_range", name: "<6.5-rc7", product: { name: "Open Source Linux Kernel <6.5-rc7", product_id: "T031014", }, }, ], category: "product_name", name: "Linux Kernel", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-39197", notes: [ { category: "description", text: "Es besteht eine Schwachstelle im Linux-Kernel. Dieser Fehler besteht in der Komponente Netfilter Connection Tracking aufgrund eines Out-of-Bounds-Read-Problems. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T014381", "2951", "T002207", "67646", "T000126", "T021415", "T031092", "T034583", "T036366", "398363", ], }, release_date: "2023-11-08T23:00:00.000+00:00", title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", notes: [ { category: "description", text: "Es besteht eine Schwachstelle im Linux-Kernel. Dieser Fehler besteht im QXL-Treiber aufgrund einer Race Condition, die es erlaubt, den zurückgegebenen qobj-Handle-Wert zu erraten und ein Use-after-free-Problem auszulösen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "T014381", "2951", "T002207", "67646", "T000126", "T021415", "T031092", "T034583", "T036366", "398363", ], }, release_date: "2023-11-08T23:00:00.000+00:00", title: "CVE-2023-39198", }, ], }
WID-SEC-W-2024-3377
Vulnerability from csaf_certbund
Published
2024-11-07 23:00
Modified
2024-11-07 23:00
Summary
Dell PowerProtect Data Domain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen und um nicht näher beschriebene Auswirkungen zu erzielen.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen und um nicht näher beschriebene Auswirkungen zu erzielen.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3377 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json", }, { category: "self", summary: "WID-SEC-2024-3377 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377", }, { category: "external", summary: "Dell Security Update", url: "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability", }, ], source_lang: "en-US", title: "Dell PowerProtect Data Domain: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-07T23:00:00.000+00:00", generator: { date: "2024-11-08T12:08:33.588+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-3377", initial_release_date: "2024-11-07T23:00:00.000+00:00", revision_history: [ { date: "2024-11-07T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<8.1.0.0", product: { name: "Dell PowerProtect Data Domain <8.1.0.0", product_id: "T038861", }, }, { category: "product_version", name: "8.1.0.0", product: { name: "Dell PowerProtect Data Domain 8.1.0.0", product_id: "T038861-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:8.1.0.0", }, }, }, { category: "product_version_range", name: "<7.13.1.10", product: { name: "Dell PowerProtect Data Domain <7.13.1.10", product_id: "T038862", }, }, { category: "product_version", name: "7.13.1.10", product: { name: "Dell PowerProtect Data Domain 7.13.1.10", product_id: "T038862-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.13.1.10", }, }, }, { category: "product_version_range", name: "<7.10.1.40", product: { name: "Dell PowerProtect Data Domain <7.10.1.40", product_id: "T038863", }, }, { category: "product_version", name: "7.10.1.40", product: { name: "Dell PowerProtect Data Domain 7.10.1.40", product_id: "T038863-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.10.1.40", }, }, }, { category: "product_version_range", name: "<7.7.5.50", product: { name: "Dell PowerProtect Data Domain <7.7.5.50", product_id: "T038864", }, }, { category: "product_version", name: "7.7.5.50", product: { name: "Dell PowerProtect Data Domain 7.7.5.50", product_id: "T038864-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.7.5.50", }, }, }, ], category: "product_name", name: "powerprotect_data_domain", }, ], category: "vendor", name: "dell", }, ], }, vulnerabilities: [ { cve: "CVE-2024-45759", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Dell PowerProtect Data Domain. Dieser Fehler existiert wegen unzureichender Privilegienbeschränkungen, die unautorisierte Konfigurationsänderungen ermöglichen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um bestimmte Befehle auszuführen, die Systemkonfiguration der Anwendung zu überschreiben und so seine Privilegien zu erhöhen oder einen Denial-of-Service-Zustand zu erzeugen. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-45759", }, { cve: "CVE-2024-48010", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Dell PowerProtect Data Domain. Dieser Fehler existiert wegen einer unsachgemäßen Zugriffskontrolle. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erhöhen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-48010", }, { cve: "CVE-2024-48011", notes: [ { category: "description", text: "Es existiert eine nicht näher beschriebene Schwachstelle in Dell PowerProtect Data Domain. Ein entfernter, authentisierter Angreifer kann dadurch Informationen offenlegen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-48011", }, { cve: "CVE-2017-16829", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2017-16829", }, { cve: "CVE-2017-5849", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2017-5849", }, { cve: "CVE-2018-7208", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2018-7208", }, { cve: "CVE-2019-14889", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2019-14889", }, { cve: "CVE-2020-12912", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-12912", }, { cve: "CVE-2020-16135", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-16135", }, { cve: "CVE-2020-1730", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-1730", }, { cve: "CVE-2020-24455", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-24455", }, { cve: "CVE-2020-8694", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-8694", }, { cve: "CVE-2020-8695", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-8695", }, { cve: "CVE-2021-27219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-27219", }, { cve: "CVE-2021-3565", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-3565", }, { cve: "CVE-2021-3634", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-3634", }, { cve: "CVE-2022-1210", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1210", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1996", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1996", }, { cve: "CVE-2022-22576", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-22576", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-27774", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27774", }, { cve: "CVE-2022-27775", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27775", }, { cve: "CVE-2022-27776", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27776", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-29361", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-29361", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-40023", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-40023", }, { cve: "CVE-2022-40090", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-40090", }, { cve: "CVE-2022-42915", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-42915", }, { cve: "CVE-2022-42916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-42916", }, { cve: "CVE-2022-43551", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-43551", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-4603", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-4603", }, { cve: "CVE-2022-48064", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-48064", }, { cve: "CVE-2022-48624", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-48624", }, { cve: "CVE-2023-0461", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-0461", }, { cve: "CVE-2023-1667", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-1667", }, { cve: "CVE-2023-1916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-1916", }, { cve: "CVE-2023-20592", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-20592", }, { cve: "CVE-2023-2137", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2137", }, { cve: "CVE-2023-22745", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-22745", }, { cve: "CVE-2023-2283", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2283", }, { cve: "CVE-2023-23914", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23914", }, { cve: "CVE-2023-23915", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23915", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23934", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23934", }, { cve: "CVE-2023-25577", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-25577", }, { cve: "CVE-2023-26965", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-26965", }, { cve: "CVE-2023-27043", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27043", }, { cve: "CVE-2023-2731", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2731", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-28319", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28319", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-31083", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-31083", }, { cve: "CVE-2023-34055", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-34055", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-38286", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38286", }, { cve: "CVE-2023-38469", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38469", }, { cve: "CVE-2023-38471", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38471", }, { cve: "CVE-2023-38472", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38472", }, { cve: "CVE-2023-38545", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38545", }, { cve: "CVE-2023-38546", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38546", }, { cve: "CVE-2023-39197", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39198", }, { cve: "CVE-2023-39804", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39804", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-42465", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-42465", }, { cve: "CVE-2023-4255", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-4255", }, { cve: "CVE-2023-45139", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45139", }, { cve: "CVE-2023-45322", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45322", }, { cve: "CVE-2023-45863", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45871", }, { cve: "CVE-2023-46136", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46136", }, { cve: "CVE-2023-46218", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46218", }, { cve: "CVE-2023-46219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46219", }, { cve: "CVE-2023-46751", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46751", }, { cve: "CVE-2023-48795", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-48795", }, { cve: "CVE-2023-49083", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-49083", }, { cve: "CVE-2023-50447", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50447", }, { cve: "CVE-2023-5049", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5049", }, { cve: "CVE-2023-50495", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50495", }, { cve: "CVE-2023-50782", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50782", }, { cve: "CVE-2023-51257", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-51257", }, { cve: "CVE-2023-52425", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-52425", }, { cve: "CVE-2023-52426", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-52426", }, { cve: "CVE-2023-5678", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5678", }, { cve: "CVE-2023-5717", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5717", }, { cve: "CVE-2023-5752", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5752", }, { cve: "CVE-2023-6004", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6004", }, { cve: "CVE-2023-6597", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6597", }, { cve: "CVE-2023-6918", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6918", }, { cve: "CVE-2023-7207", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-7207", }, { cve: "CVE-2024-0450", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0450", }, { cve: "CVE-2024-0727", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0727", }, { cve: "CVE-2024-0985", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0985", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-21626", }, { cve: "CVE-2024-22195", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-22195", }, { cve: "CVE-2024-22365", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-22365", }, { cve: "CVE-2024-23651", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23651", }, { cve: "CVE-2024-23652", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23652", }, { cve: "CVE-2024-23653", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23653", }, { cve: "CVE-2024-23672", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23672", }, { cve: "CVE-2024-24549", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-24549", }, { cve: "CVE-2024-25062", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-25062", }, { cve: "CVE-2024-26130", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26130", }, { cve: "CVE-2024-26458", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26458", }, { cve: "CVE-2024-26461", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26461", }, { cve: "CVE-2024-28085", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28085", }, { cve: "CVE-2024-28182", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28182", }, { cve: "CVE-2024-28219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28219", }, { cve: "CVE-2024-28757", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28757", }, ], }
WID-SEC-W-2023-2864
Vulnerability from csaf_certbund
Published
2023-11-08 23:00
Modified
2024-07-18 22:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um Informationen offenzulegen, seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand auszulösen.
Betroffene Betriebssysteme
- Linux
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um Informationen offenzulegen, seine Privilegien zu erweitern oder einen Denial-of-Service-Zustand auszulösen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2864 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2864.json", }, { category: "self", summary: "WID-SEC-2023-2864 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2864", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-4 vom 2024-01-05", url: "https://ubuntu.com/security/notices/USN-6549-4", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-1 vom 2023-12-12", url: "https://ubuntu.com/security/notices/USN-6549-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0622-1 vom 2024-02-26", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6534-2 vom 2023-12-12", url: "https://ubuntu.com/security/notices/USN-6534-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-2 vom 2023-12-12", url: "https://ubuntu.com/security/notices/USN-6549-2", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-045 vom 2024-01-09", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-045.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2024-2391 vom 2024-01-10", url: "https://alas.aws.amazon.com/AL2/ALAS-2024-2391.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-5 vom 2024-01-10", url: "https://ubuntu.com/security/notices/USN-6549-5", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4782-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4784-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6534-3 vom 2023-12-13", url: "https://ubuntu.com/security/notices/USN-6534-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4811-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4783-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4810-1 vom 2023-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html", }, { category: "external", summary: "Ubuntu Security Notice USN-6549-3 vom 2023-12-13", url: "https://ubuntu.com/security/notices/USN-6549-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4730-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4732-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4735-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4731-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4733-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017383.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4734-1 vom 2023-12-14", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017379.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4882-1 vom 2023-12-15", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:4883-1 vom 2023-12-15", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0666-1 vom 2024-02-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0662-1 vom 2024-02-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018065.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0655-1 vom 2024-02-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0705-1 vom 2024-02-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018067.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0698-1 vom 2024-02-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0112-1 vom 2024-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:0727-1 vom 2024-02-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-047 vom 2024-01-23", url: "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-047.html", }, { category: "external", summary: "Red Hat Bugzilla – Bug 2218342", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-39197", }, { category: "external", summary: "RedHat Customer Portal für CVE-2023-39197 vom 2023-11-08", url: "https://access.redhat.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "Red Hat Bugzilla – Bug 2218332", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2023-39198", }, { category: "external", summary: "RedHat Customer Portal für CVE-2023-39198 vom 2023-11-08", url: "https://access.redhat.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "Ubuntu Security Notice USN-6534-1 vom 2023-12-06", url: "https://ubuntu.com/security/notices/USN-6534-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6700-1 vom 2024-03-19", url: "https://ubuntu.com/security/notices/USN-6700-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6701-1 vom 2024-03-19", url: "https://ubuntu.com/security/notices/USN-6701-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6701-2 vom 2024-03-20", url: "https://ubuntu.com/security/notices/USN-6701-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6700-2 vom 2024-03-21", url: "https://ubuntu.com/security/notices/USN-6700-2", }, { category: "external", summary: "Ubuntu Security Notice USN-6701-3 vom 2024-03-26", url: "https://ubuntu.com/security/notices/USN-6701-3", }, { category: "external", summary: "Ubuntu Security Notice USN-6701-4 vom 2024-04-09", url: "https://ubuntu.com/security/notices/USN-6701-4", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:2394 vom 2024-04-30", url: "https://access.redhat.com/errata/RHSA-2024:2394", }, { category: "external", summary: "Dell Security Advisory DSA-2024-198 vom 2024-05-08", url: "https://www.dell.com/support/kbdoc/000224827/dsa-2024-=", }, { category: "external", summary: "IBM Security Bulletin 7152469 vom 2024-05-15", url: "https://www.ibm.com/support/pages/node/7152469", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:3138 vom 2024-05-22", url: "https://access.redhat.com/errata/RHSA-2024:3138", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2024:2950 vom 2024-05-22", url: "https://access.redhat.com/errata/RHSA-2024:2950", }, { category: "external", summary: "IBM Security Bulletin 7156774 vom 2024-06-07", url: "https://www.ibm.com/support/pages/node/7156774", }, { category: "external", summary: "Debian Security Advisory DLA-3841 vom 2024-06-25", url: "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", }, { category: "external", summary: "Dell Security Advisory DSA-2024-239 vom 2024-07-18", url: "https://www.dell.com/support/kbdoc/de-de/000227051/dsa-2024-239-security-update-dell-ecs-3-8-1-1-for-multiple-security-vulnerabilities", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen", tracking: { current_release_date: "2024-07-18T22:00:00.000+00:00", generator: { date: "2024-08-15T18:01:22.061+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2864", initial_release_date: "2023-11-08T23:00:00.000+00:00", revision_history: [ { date: "2023-11-08T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-12-05T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-12-11T23:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-12-12T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-12-13T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE und Ubuntu aufgenommen", }, { date: "2023-12-14T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-12-17T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-01-07T23:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-01-09T23:00:00.000+00:00", number: "9", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2024-01-10T23:00:00.000+00:00", number: "10", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-01-17T23:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-01-22T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2024-02-26T23:00:00.000+00:00", number: "13", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-02-28T23:00:00.000+00:00", number: "14", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-02-29T23:00:00.000+00:00", number: "15", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-03-18T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-03-20T23:00:00.000+00:00", number: "17", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-03-21T23:00:00.000+00:00", number: "18", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-03-25T23:00:00.000+00:00", number: "19", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-04-09T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2024-04-29T22:00:00.000+00:00", number: "21", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-05-07T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Dell aufgenommen", }, { date: "2024-05-15T22:00:00.000+00:00", number: "23", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-05-21T22:00:00.000+00:00", number: "24", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2024-06-09T22:00:00.000+00:00", number: "25", summary: "Neue Updates von IBM aufgenommen", }, { date: "2024-06-25T22:00:00.000+00:00", number: "26", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-07-18T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Dell aufgenommen", }, ], status: "final", version: "27", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.1", product: { name: "Dell ECS <3.8.1.1", product_id: "T036366", }, }, ], category: "product_name", name: "ECS", }, { branches: [ { category: "product_version", name: "virtual", product: { name: "Dell NetWorker virtual", product_id: "T034583", product_identification_helper: { cpe: "cpe:/a:dell:networker:virtual", }, }, }, ], category: "product_name", name: "NetWorker", }, ], category: "vendor", name: "Dell", }, { branches: [ { category: "product_name", name: "EMC Avamar", product: { name: "EMC Avamar", product_id: "T014381", product_identification_helper: { cpe: "cpe:/a:emc:avamar:-", }, }, }, ], category: "vendor", name: "EMC", }, { branches: [ { category: "product_name", name: "IBM QRadar SIEM", product: { name: "IBM QRadar SIEM", product_id: "T021415", product_identification_helper: { cpe: "cpe:/a:ibm:qradar_siem:-", }, }, }, { branches: [ { category: "product_version", name: "12", product: { name: "IBM Security Guardium 12.0", product_id: "T031092", product_identification_helper: { cpe: "cpe:/a:ibm:security_guardium:12.0", }, }, }, ], category: "product_name", name: "Security Guardium", }, ], category: "vendor", name: "IBM", }, { branches: [ { branches: [ { category: "product_version_range", name: "<6.4.4", product: { name: "Open Source Linux Kernel <6.4.4", product_id: "T031013", }, }, { category: "product_version_range", name: "<6.5-rc7", product: { name: "Open Source Linux Kernel <6.5-rc7", product_id: "T031014", }, }, ], category: "product_name", name: "Linux Kernel", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-39197", notes: [ { category: "description", text: "Es besteht eine Schwachstelle im Linux-Kernel. Dieser Fehler besteht in der Komponente Netfilter Connection Tracking aufgrund eines Out-of-Bounds-Read-Problems. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T014381", "2951", "T002207", "67646", "T000126", "T021415", "T031092", "T034583", "T036366", "398363", ], }, release_date: "2023-11-08T23:00:00.000+00:00", title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", notes: [ { category: "description", text: "Es besteht eine Schwachstelle im Linux-Kernel. Dieser Fehler besteht im QXL-Treiber aufgrund einer Race Condition, die es erlaubt, den zurückgegebenen qobj-Handle-Wert zu erraten und ein Use-after-free-Problem auszulösen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder seine Privilegien zu erweitern.", }, ], product_status: { known_affected: [ "T014381", "2951", "T002207", "67646", "T000126", "T021415", "T031092", "T034583", "T036366", "398363", ], }, release_date: "2023-11-08T23:00:00.000+00:00", title: "CVE-2023-39198", }, ], }
wid-sec-w-2024-3377
Vulnerability from csaf_certbund
Published
2024-11-07 23:00
Modified
2024-11-07 23:00
Summary
Dell PowerProtect Data Domain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen und um nicht näher beschriebene Auswirkungen zu erzielen.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen und um nicht näher beschriebene Auswirkungen zu erzielen.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3377 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json", }, { category: "self", summary: "WID-SEC-2024-3377 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377", }, { category: "external", summary: "Dell Security Update", url: "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability", }, ], source_lang: "en-US", title: "Dell PowerProtect Data Domain: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-07T23:00:00.000+00:00", generator: { date: "2024-11-08T12:08:33.588+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-3377", initial_release_date: "2024-11-07T23:00:00.000+00:00", revision_history: [ { date: "2024-11-07T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<8.1.0.0", product: { name: "Dell PowerProtect Data Domain <8.1.0.0", product_id: "T038861", }, }, { category: "product_version", name: "8.1.0.0", product: { name: "Dell PowerProtect Data Domain 8.1.0.0", product_id: "T038861-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:8.1.0.0", }, }, }, { category: "product_version_range", name: "<7.13.1.10", product: { name: "Dell PowerProtect Data Domain <7.13.1.10", product_id: "T038862", }, }, { category: "product_version", name: "7.13.1.10", product: { name: "Dell PowerProtect Data Domain 7.13.1.10", product_id: "T038862-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.13.1.10", }, }, }, { category: "product_version_range", name: "<7.10.1.40", product: { name: "Dell PowerProtect Data Domain <7.10.1.40", product_id: "T038863", }, }, { category: "product_version", name: "7.10.1.40", product: { name: "Dell PowerProtect Data Domain 7.10.1.40", product_id: "T038863-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.10.1.40", }, }, }, { category: "product_version_range", name: "<7.7.5.50", product: { name: "Dell PowerProtect Data Domain <7.7.5.50", product_id: "T038864", }, }, { category: "product_version", name: "7.7.5.50", product: { name: "Dell PowerProtect Data Domain 7.7.5.50", product_id: "T038864-fixed", product_identification_helper: { cpe: "cpe:/a:dell:powerprotect_data_domain:7.7.5.50", }, }, }, ], category: "product_name", name: "powerprotect_data_domain", }, ], category: "vendor", name: "dell", }, ], }, vulnerabilities: [ { cve: "CVE-2024-45759", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Dell PowerProtect Data Domain. Dieser Fehler existiert wegen unzureichender Privilegienbeschränkungen, die unautorisierte Konfigurationsänderungen ermöglichen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um bestimmte Befehle auszuführen, die Systemkonfiguration der Anwendung zu überschreiben und so seine Privilegien zu erhöhen oder einen Denial-of-Service-Zustand zu erzeugen. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-45759", }, { cve: "CVE-2024-48010", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Dell PowerProtect Data Domain. Dieser Fehler existiert wegen einer unsachgemäßen Zugriffskontrolle. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erhöhen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-48010", }, { cve: "CVE-2024-48011", notes: [ { category: "description", text: "Es existiert eine nicht näher beschriebene Schwachstelle in Dell PowerProtect Data Domain. Ein entfernter, authentisierter Angreifer kann dadurch Informationen offenlegen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-48011", }, { cve: "CVE-2017-16829", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2017-16829", }, { cve: "CVE-2017-5849", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2017-5849", }, { cve: "CVE-2018-7208", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2018-7208", }, { cve: "CVE-2019-14889", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2019-14889", }, { cve: "CVE-2020-12912", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-12912", }, { cve: "CVE-2020-16135", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-16135", }, { cve: "CVE-2020-1730", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-1730", }, { cve: "CVE-2020-24455", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-24455", }, { cve: "CVE-2020-8694", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-8694", }, { cve: "CVE-2020-8695", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2020-8695", }, { cve: "CVE-2021-27219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-27219", }, { cve: "CVE-2021-3565", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-3565", }, { cve: "CVE-2021-3634", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2021-3634", }, { cve: "CVE-2022-1210", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1210", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1996", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-1996", }, { cve: "CVE-2022-22576", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-22576", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-27774", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27774", }, { cve: "CVE-2022-27775", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27775", }, { cve: "CVE-2022-27776", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27776", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-29361", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-29361", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-40023", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-40023", }, { cve: "CVE-2022-40090", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-40090", }, { cve: "CVE-2022-42915", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-42915", }, { cve: "CVE-2022-42916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-42916", }, { cve: "CVE-2022-43551", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-43551", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-4603", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-4603", }, { cve: "CVE-2022-48064", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-48064", }, { cve: "CVE-2022-48624", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2022-48624", }, { cve: "CVE-2023-0461", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-0461", }, { cve: "CVE-2023-1667", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-1667", }, { cve: "CVE-2023-1916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-1916", }, { cve: "CVE-2023-20592", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-20592", }, { cve: "CVE-2023-2137", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2137", }, { cve: "CVE-2023-22745", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-22745", }, { cve: "CVE-2023-2283", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2283", }, { cve: "CVE-2023-23914", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23914", }, { cve: "CVE-2023-23915", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23915", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23934", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-23934", }, { cve: "CVE-2023-25577", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-25577", }, { cve: "CVE-2023-26965", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-26965", }, { cve: "CVE-2023-27043", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27043", }, { cve: "CVE-2023-2731", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-2731", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-28319", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28319", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-31083", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-31083", }, { cve: "CVE-2023-34055", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-34055", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-38286", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38286", }, { cve: "CVE-2023-38469", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38469", }, { cve: "CVE-2023-38471", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38471", }, { cve: "CVE-2023-38472", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38472", }, { cve: "CVE-2023-38545", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38545", }, { cve: "CVE-2023-38546", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-38546", }, { cve: "CVE-2023-39197", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39198", }, { cve: "CVE-2023-39804", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-39804", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-42465", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-42465", }, { cve: "CVE-2023-4255", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-4255", }, { cve: "CVE-2023-45139", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45139", }, { cve: "CVE-2023-45322", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45322", }, { cve: "CVE-2023-45863", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-45871", }, { cve: "CVE-2023-46136", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46136", }, { cve: "CVE-2023-46218", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46218", }, { cve: "CVE-2023-46219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46219", }, { cve: "CVE-2023-46751", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-46751", }, { cve: "CVE-2023-48795", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-48795", }, { cve: "CVE-2023-49083", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-49083", }, { cve: "CVE-2023-50447", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50447", }, { cve: "CVE-2023-5049", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5049", }, { cve: "CVE-2023-50495", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50495", }, { cve: "CVE-2023-50782", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-50782", }, { cve: "CVE-2023-51257", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-51257", }, { cve: "CVE-2023-52425", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-52425", }, { cve: "CVE-2023-52426", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-52426", }, { cve: "CVE-2023-5678", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5678", }, { cve: "CVE-2023-5717", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5717", }, { cve: "CVE-2023-5752", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-5752", }, { cve: "CVE-2023-6004", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6004", }, { cve: "CVE-2023-6597", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6597", }, { cve: "CVE-2023-6918", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-6918", }, { cve: "CVE-2023-7207", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2023-7207", }, { cve: "CVE-2024-0450", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0450", }, { cve: "CVE-2024-0727", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0727", }, { cve: "CVE-2024-0985", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-0985", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-21626", }, { cve: "CVE-2024-22195", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-22195", }, { cve: "CVE-2024-22365", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-22365", }, { cve: "CVE-2024-23651", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23651", }, { cve: "CVE-2024-23652", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23652", }, { cve: "CVE-2024-23653", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23653", }, { cve: "CVE-2024-23672", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-23672", }, { cve: "CVE-2024-24549", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-24549", }, { cve: "CVE-2024-25062", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-25062", }, { cve: "CVE-2024-26130", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26130", }, { cve: "CVE-2024-26458", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26458", }, { cve: "CVE-2024-26461", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-26461", }, { cve: "CVE-2024-28085", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28085", }, { cve: "CVE-2024-28182", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28182", }, { cve: "CVE-2024-28219", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28219", }, { cve: "CVE-2024-28757", notes: [ { category: "description", text: "Es existieren mehrere Schwachstellen in Dell PowerProtect Data Domain bezüglich genutzter Komponenten von Drittanbietern, wie Apache Tomcat, curl, Linux Kernel, python und anderen, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und veröffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht näher spezifizierte Auswirkungen zu verursachen.", }, ], product_status: { known_affected: [ "T038864", "T038863", "T038862", "T038861", ], }, release_date: "2024-11-07T23:00:00.000+00:00", title: "CVE-2024-28757", }, ], }
suse-su-2023:4733-1
Vulnerability from csaf_suse
Published
2023-12-12 14:15
Modified
2023-12-12 14:15
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
The following non-security bugs were fixed:
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- Call flush_delayed_fput() from nfsd main-loop (bsc#1217408).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
Patchnames
SUSE-2023-4733,SUSE-SUSE-MicroOS-5.1-2023-4733,SUSE-SUSE-MicroOS-5.2-2023-4733
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).\n- Call flush_delayed_fput() from nfsd main-loop (bsc#1217408).\n- net: mana: Configure hwc timeout from hardware (bsc#1214037).\n- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4733,SUSE-SUSE-MicroOS-5.1-2023-4733,SUSE-SUSE-MicroOS-5.2-2023-4733", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4733-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4733-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234733-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4733-1", url: "https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1214037", url: "https://bugzilla.suse.com/1214037", }, { category: "self", summary: "SUSE Bug 1214344", url: "https://bugzilla.suse.com/1214344", }, { category: "self", summary: "SUSE Bug 1214764", url: "https://bugzilla.suse.com/1214764", }, { category: "self", summary: "SUSE Bug 1215371", url: "https://bugzilla.suse.com/1215371", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217408", url: "https://bugzilla.suse.com/1217408", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:15:30Z", generator: { date: "2023-12-12T14:15:30Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4733-1", initial_release_date: "2023-12-12T14:15:30Z", revision_history: [ { date: "2023-12-12T14:15:30Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.3.18-150300.152.1.noarch", product: { name: "kernel-devel-rt-5.3.18-150300.152.1.noarch", product_id: "kernel-devel-rt-5.3.18-150300.152.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.3.18-150300.152.1.noarch", product: { name: "kernel-source-rt-5.3.18-150300.152.1.noarch", product_id: "kernel-source-rt-5.3.18-150300.152.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.3.18-150300.152.1.x86_64", product: { name: "cluster-md-kmp-rt-5.3.18-150300.152.1.x86_64", product_id: "cluster-md-kmp-rt-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product_id: "cluster-md-kmp-rt_debug-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.3.18-150300.152.1.x86_64", product: { name: "dlm-kmp-rt-5.3.18-150300.152.1.x86_64", product_id: "dlm-kmp-rt-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product: { name: "dlm-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product_id: "dlm-kmp-rt_debug-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.3.18-150300.152.1.x86_64", product: { name: "gfs2-kmp-rt-5.3.18-150300.152.1.x86_64", product_id: "gfs2-kmp-rt-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product: { name: "gfs2-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product_id: "gfs2-kmp-rt_debug-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt-devel-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt-devel-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt-extra-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt-extra-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt-optional-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt-optional-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt_debug-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt_debug-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt_debug-devel-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt_debug-devel-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt_debug-extra-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt_debug-extra-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-optional-5.3.18-150300.152.1.x86_64", product: { name: "kernel-rt_debug-optional-5.3.18-150300.152.1.x86_64", product_id: "kernel-rt_debug-optional-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.3.18-150300.152.1.x86_64", product: { name: "kernel-syms-rt-5.3.18-150300.152.1.x86_64", product_id: "kernel-syms-rt-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.3.18-150300.152.1.x86_64", product: { name: "kselftests-kmp-rt-5.3.18-150300.152.1.x86_64", product_id: "kselftests-kmp-rt-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product: { name: "kselftests-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product_id: "kselftests-kmp-rt_debug-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.3.18-150300.152.1.x86_64", product: { name: "ocfs2-kmp-rt-5.3.18-150300.152.1.x86_64", product_id: "ocfs2-kmp-rt-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product_id: "ocfs2-kmp-rt_debug-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.3.18-150300.152.1.x86_64", product: { name: "reiserfs-kmp-rt-5.3.18-150300.152.1.x86_64", product_id: "reiserfs-kmp-rt-5.3.18-150300.152.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-5.3.18-150300.152.1.x86_64", product_id: "reiserfs-kmp-rt_debug-5.3.18-150300.152.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.152.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.152.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.152.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.152.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, ], }, vulnerabilities: [ { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:30Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:30Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:30Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:30Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:30Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:30Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.152.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.152.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:30Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4811-1
Vulnerability from csaf_suse
Published
2023-12-13 18:01
Modified
2023-12-13 18:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
The following non-security bugs were fixed:
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- Call flush_delayed_fput() from nfsd main-loop (bsc#1217408).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
Patchnames
SUSE-2023-4811,SUSE-SLE-Module-Live-Patching-15-SP3-2023-4811,SUSE-SLE-Product-HA-15-SP3-2023-4811,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4811,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4811,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4811,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4811,SUSE-SUSE-MicroOS-5.1-2023-4811,SUSE-SUSE-MicroOS-5.2-2023-4811,SUSE-Storage-7.1-2023-4811
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).\n- Call flush_delayed_fput() from nfsd main-loop (bsc#1217408).\n- net: mana: Configure hwc timeout from hardware (bsc#1214037).\n- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4811,SUSE-SLE-Module-Live-Patching-15-SP3-2023-4811,SUSE-SLE-Product-HA-15-SP3-2023-4811,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4811,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4811,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4811,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4811,SUSE-SUSE-MicroOS-5.1-2023-4811,SUSE-SUSE-MicroOS-5.2-2023-4811,SUSE-Storage-7.1-2023-4811", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4811-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4811-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234811-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4811-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1214037", url: "https://bugzilla.suse.com/1214037", }, { category: "self", summary: "SUSE Bug 1214344", url: "https://bugzilla.suse.com/1214344", }, { category: "self", summary: "SUSE Bug 1214764", url: "https://bugzilla.suse.com/1214764", }, { category: "self", summary: "SUSE Bug 1215371", url: "https://bugzilla.suse.com/1215371", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217408", url: "https://bugzilla.suse.com/1217408", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-13T18:01:56Z", generator: { date: "2023-12-13T18:01:56Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4811-1", initial_release_date: "2023-12-13T18:01:56Z", revision_history: [ { date: "2023-12-13T18:01:56Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product_id: "cluster-md-kmp-64kb-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product: { name: "dlm-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product_id: "dlm-kmp-64kb-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", product_id: "dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-al-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-al-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-al-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-allwinner-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-allwinner-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-altera-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-altera-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-amd-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-amd-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-amlogic-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-amlogic-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-apm-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-apm-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-arm-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-arm-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-broadcom-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-broadcom-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-cavium-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-cavium-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-exynos-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-exynos-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-freescale-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-freescale-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-hisilicon-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-hisilicon-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-lg-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-lg-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-marvell-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-marvell-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-mediatek-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-mediatek-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-nvidia-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-nvidia-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-qcom-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-qcom-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-renesas-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-renesas-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-rockchip-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-rockchip-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-socionext-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-socionext-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-sprd-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-sprd-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-xilinx-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-xilinx-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "dtb-zte-5.3.18-150300.59.144.1.aarch64", product: { name: "dtb-zte-5.3.18-150300.59.144.1.aarch64", product_id: "dtb-zte-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product: { name: "gfs2-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product_id: "gfs2-kmp-64kb-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-64kb-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-64kb-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-64kb-extra-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-64kb-extra-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-64kb-livepatch-devel-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-64kb-optional-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-64kb-optional-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-default-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-default-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", product: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", product_id: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-default-extra-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-default-extra-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-default-optional-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-default-optional-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-obs-qa-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-preempt-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-preempt-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-preempt-optional-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.144.1.aarch64", product: { name: "kernel-syms-5.3.18-150300.59.144.1.aarch64", product_id: "kernel-syms-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product: { name: "kselftests-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product_id: "kselftests-kmp-64kb-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.144.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.144.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product_id: "ocfs2-kmp-64kb-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.144.1.aarch64", product_id: "reiserfs-kmp-64kb-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.144.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.144.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150300.59.144.1.noarch", product: { name: "kernel-devel-5.3.18-150300.59.144.1.noarch", product_id: "kernel-devel-5.3.18-150300.59.144.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150300.59.144.1.noarch", product: { name: "kernel-docs-5.3.18-150300.59.144.1.noarch", product_id: "kernel-docs-5.3.18-150300.59.144.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150300.59.144.1.noarch", product: { name: "kernel-docs-html-5.3.18-150300.59.144.1.noarch", product_id: "kernel-docs-html-5.3.18-150300.59.144.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150300.59.144.1.noarch", product: { name: "kernel-macros-5.3.18-150300.59.144.1.noarch", product_id: "kernel-macros-5.3.18-150300.59.144.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150300.59.144.1.noarch", product: { name: "kernel-source-5.3.18-150300.59.144.1.noarch", product_id: "kernel-source-5.3.18-150300.59.144.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150300.59.144.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-150300.59.144.1.noarch", product_id: "kernel-source-vanilla-5.3.18-150300.59.144.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-debug-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-debug-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-default-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-default-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", product: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", product_id: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-default-extra-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-default-optional-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-default-optional-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", product_id: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.144.1.ppc64le", product: { name: "kernel-syms-5.3.18-150300.59.144.1.ppc64le", product_id: "kernel-syms-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.144.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150300.59.144.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.144.1.s390x", product: { name: "dlm-kmp-default-5.3.18-150300.59.144.1.s390x", product_id: "dlm-kmp-default-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", product_id: "gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-default-5.3.18-150300.59.144.1.s390x", product_id: "kernel-default-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", product: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", product_id: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-default-devel-5.3.18-150300.59.144.1.s390x", product_id: "kernel-default-devel-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-default-extra-5.3.18-150300.59.144.1.s390x", product_id: "kernel-default-extra-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", product_id: "kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-default-optional-5.3.18-150300.59.144.1.s390x", product_id: "kernel-default-optional-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", product: { name: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", product_id: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-obs-build-5.3.18-150300.59.144.1.s390x", product_id: "kernel-obs-build-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-obs-qa-5.3.18-150300.59.144.1.s390x", product_id: "kernel-obs-qa-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-syms-5.3.18-150300.59.144.1.s390x", product_id: "kernel-syms-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", product_id: "kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.144.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-150300.59.144.1.s390x", product_id: "kselftests-kmp-default-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", product_id: "dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-debug-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-debug-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-debug-devel-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-default-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-default-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", product: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", product_id: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-default-extra-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-default-extra-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-default-optional-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-default-optional-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_144-preempt-1-150300.7.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_144-preempt-1-150300.7.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_144-preempt-1-150300.7.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-obs-qa-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-preempt-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-preempt-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-preempt-optional-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.144.1.x86_64", product: { name: "kernel-syms-5.3.18-150300.59.144.1.x86_64", product_id: "kernel-syms-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.144.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.144.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.144.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.144.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP3", product: { name: "SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7.1", product: { name: "SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1", product_identification_helper: { cpe: "cpe:/o:suse:ses:7.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", }, product_reference: "kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.144.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.s390x as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.144.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.144.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.144.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.144.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.144.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.144.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.144.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.144.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.144.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, ], }, vulnerabilities: [ { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T18:01:56Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T18:01:56Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T18:01:56Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T18:01:56Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T18:01:56Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T18:01:56Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.144.1.150300.18.84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.144.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.144.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.144.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T18:01:56Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4732-1
Vulnerability from csaf_suse
Published
2023-12-12 14:14
Modified
2023-12-12 14:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-46813: Fixed SEV-ES local priv escalation (bsc#1212649).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
The following non-security bugs were fixed:
- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).
- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).
- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).
- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).
- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).
- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).
- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).
- alsa: hda/realtek: add quirks for hp laptops (git-fixes).
- alsa: hda/realtek: add support dual speaker for dell (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).
- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).
- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).
- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).
- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).
- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).
- alsa: info: fix potential deadlock at disconnection (git-fixes).
- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: add cortex-a520 cpu part definition (git-fixes)
- arm64: allow kprobes on el0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass esr_elx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out el1 ssbs emulation hook (git-fixes)
- arm64: report el1 undefs better (git-fixes)
- arm64: rework bti exception handling (git-fixes)
- arm64: rework el0 mrs emulation (git-fixes)
- arm64: rework fpac exception handling (git-fixes)
- arm64: split el0/el1 undef handlers (git-fixes)
- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- asoc: ams-delta.c: use component after check (git-fixes).
- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).
- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).
- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).
- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).
- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).
- asoc: rt5650: fix the wrong result of key button (git-fixes).
- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).
- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).
- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).
- atl1c: work around the dma rx overflow issue (git-fixes).
- atm: iphase: do pci error checks on own line (git-fixes).
- blk-mq: do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: add device 0bda:887b to device tables (git-fixes).
- bluetooth: add device 13d3:3571 to device tables (git-fixes).
- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).
- bluetooth: btusb: add date->evt_skb is null check (git-fixes).
- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).
- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).
- btrfs: always log symlinks in full mode (bsc#1214840).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).
- can: isotp: set max pdu size to 64 kbyte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: fix comment (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).
- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).
- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).
- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).
- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).
- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).
- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).
- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).
- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).
- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).
- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.
- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use c syntax highlight in driver.rst (bsc#1215458).
- documentation: networking: correct possessive 'its' (bsc#1215458).
- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).
- drm/amd/display: avoid null dereference of timing generator (git-fixes).
- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).
- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).
- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).
- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).
- drm/amd: update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).
- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: do not use atrm for external devices (git-fixes).
- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).
- drm/amdgpu: remove unnecessary domain argument (git-fixes).
- drm/amdgpu: reserve fences for vm update (git-fixes).
- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).
- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).
- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: tc358768: clean up clock period code (git-fixes).
- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: fix bit updates (git-fixes).
- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).
- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).
- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).
- drm/bridge: tc358768: remove unused variable (git-fixes).
- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).
- drm/bridge: tc358768: use dev for dbg prints, not priv->dev (git-fixes).
- drm/bridge: tc358768: use struct videomode (git-fixes).
- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).
- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).
- drm/gud: use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).
- drm/i915: fix potential spectre vulnerability (git-fixes).
- drm/i915: flush wc ggtt only on required platforms (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).
- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: create devm device attachment (git-fixes).
- drm/mipi-dsi: create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).
- drm/msm/dsi: free tx buffer in unbind (git-fixes).
- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).
- drm/panel: st7703: pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).
- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).
- drm/ttm: reorder sys manager cleanup step (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)
- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)
- drm: bridge: it66121: fix invalid connector dereference (git-fixes).
- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]
- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: omapfb: drop unused remove function (git-fixes).
- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- fix termination state for idr_for_each_entry_ul() (git-fixes).
- fix x86/mm: print the encryption features in hyperv is disabled
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- gpu: host1x: correct allocated size for contexts (git-fixes).
- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).
- hid: cp2112: fix duplicate workqueue initialization (git-fixes).
- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).
- hid: hyperv: remove unused struct synthhid_msg (git-fixes).
- hid: hyperv: replace one-element array with flexible-array member (git-fixes).
- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).
- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).
- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).
- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).
- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).
- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).
- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).
- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).
- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).
- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and mac filter support (bsc#1215458).
- idpf: add rx splitq napi poll support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: add sriov support and other ndo_ops (bsc#1215458).
- idpf: add tx splitq napi poll support (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for rx queues (bsc#1215458).
- idpf: configure resources for tx queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).
- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).
- input: xpad - add vid for turtle beach controllers (git-fixes).
- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.
- kernel-source: move provides after sources
- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).
- leds: pwm: do not disable the pwm when the led should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: do not use smbus calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: correctly initialise try compose rectangle (git-fixes).
- media: ccs: fix driver quirk struct documentation (git-fixes).
- media: cedrus: fix clock/reset sequence (git-fixes).
- media: cobalt: use field_get() to extract link width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).
- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: fix double put in dln2_probe (git-fixes).
- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).
- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).
- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).
- mmc: block: retry commands in cqe error recovery (git-fixes).
- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).
- mmc: cqhci: increase recovery halt timeout (git-fixes).
- mmc: cqhci: warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).
- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).
- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).
- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee module_device_table built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).
- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).
- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: avoid address overwrite in kernel_connect (bsc#1216861).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nfs: fix access to page->mapping (bsc#1216788).
- nvme: update firmware version after commit (bsc#1215292).
- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).
- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).
- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).
- pci: extract ats disabling to a helper function (bsc#1215458).
- pci: exynos: do not discard .remove() callback (git-fixes).
- pci: keystone: do not discard .probe() callback (git-fixes).
- pci: keystone: do not discard .remove() callback (git-fixes).
- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).
- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).
- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).
- pci: use field_get() to extract link width (git-fixes).
- pci: vmd: correct pci header type register's multi-function check (git-fixes).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).
- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).
- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).
- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).
- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).
- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).
- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).
- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).
- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).
- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).
- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).
- platform/x86/intel/vsec: add tpmi id (bsc#1217147).
- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).
- platform/x86/intel/vsec: support private data (bsc#1217147).
- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).
- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).
- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).
- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).
- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).
- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).
- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).
- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).
- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).
- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).
- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).
- platform/x86: wmi: fix opening of char device (git-fixes).
- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).
- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).
- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).
- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).
- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).
- pwm: fix double shift bug (git-fixes).
- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).
- quota: fix slow quotaoff (bsc#1216621).
- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).
- r8152: release firmware if we have an error in probe (git-fixes).
- r8152: run the unload routine if we have errors during probe (git-fixes).
- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).
- regmap: ensure range selector registers are updated after cache sync (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).
- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).
- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036)
- revert amdgpu patches that caused a regression (bsc#1215802)
- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.
- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.
- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage
- run scripts/renamepatches for sle15-sp4
- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).
- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).
- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).
- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).
- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).
- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).
- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).
- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).
- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).
- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: fix ksft print formats (git-fixes).
- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).
- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).
- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).
- tty: 8250: add support for additional brainboxes px cards (git-fixes).
- tty: 8250: add support for additional brainboxes uc cards (git-fixes).
- tty: 8250: add support for brainboxes up cards (git-fixes).
- tty: 8250: add support for intashield is-100 (git-fixes).
- tty: 8250: add support for intashield ix cards (git-fixes).
- tty: 8250: fix port count of px-257 (git-fixes).
- tty: 8250: fix up px-803/px-857 (git-fixes).
- tty: 8250: remove uc-257 and uc-431 (git-fixes).
- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).
- update ath11k hibernation fix patch set (bsc#1207948)
- update metadata s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).
- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).
- usb: chipidea: fix dma overwrite for tegra (git-fixes).
- usb: chipidea: simplify tegra dma alignment code (git-fixes).
- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc2: write hcint with intmask applied (bsc#1214286).
- usb: dwc3: fix default mode initialization (git-fixes).
- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).
- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: serial: option: add fibocom l7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).
- usb: serial: option: fix fm101r-gl defines (git-fixes).
- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).
- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).
- usb: usbip: fix stub_dev hub disconnect (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix gtk offload status event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).
- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).
- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).
- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).
- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).
- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).
- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: make hv_get_nmi_reason public (git-fixes).
- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).
- x86/sev: fix calculation of end address based on number of pages (git-fixes).
- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).
- x86: move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert agf log flags to unsigned (git-fixes).
- xfs: convert agi log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize ag block number formatting in ftrace output (git-fixes).
- xfs: standardize ag number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
- xhci: enable rpm on controllers that support low-power states (git-fixes).
Patchnames
SUSE-2023-4732,SUSE-SLE-Micro-5.5-2023-4732,SUSE-SLE-Module-Live-Patching-15-SP5-2023-4732,SUSE-SLE-Module-RT-15-SP5-2023-4732,openSUSE-SLE-15.5-2023-4732
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-46813: Fixed SEV-ES local priv escalation (bsc#1212649).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n\nThe following non-security bugs were fixed:\n\n- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).\n- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).\n- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).\n- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).\n- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).\n- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).\n- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).\n- alsa: hda/realtek: add quirks for hp laptops (git-fixes).\n- alsa: hda/realtek: add support dual speaker for dell (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).\n- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).\n- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).\n- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).\n- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).\n- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).\n- alsa: info: fix potential deadlock at disconnection (git-fixes).\n- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: add cortex-a520 cpu part definition (git-fixes)\n- arm64: allow kprobes on el0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass esr_elx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out el1 ssbs emulation hook (git-fixes)\n- arm64: report el1 undefs better (git-fixes)\n- arm64: rework bti exception handling (git-fixes)\n- arm64: rework el0 mrs emulation (git-fixes)\n- arm64: rework fpac exception handling (git-fixes)\n- arm64: split el0/el1 undef handlers (git-fixes)\n- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- asoc: ams-delta.c: use component after check (git-fixes).\n- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).\n- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).\n- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).\n- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).\n- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).\n- asoc: rt5650: fix the wrong result of key button (git-fixes).\n- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).\n- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).\n- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: work around the dma rx overflow issue (git-fixes).\n- atm: iphase: do pci error checks on own line (git-fixes).\n- blk-mq: do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: add device 0bda:887b to device tables (git-fixes).\n- bluetooth: add device 13d3:3571 to device tables (git-fixes).\n- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).\n- bluetooth: btusb: add date->evt_skb is null check (git-fixes).\n- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).\n- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).\n- btrfs: always log symlinks in full mode (bsc#1214840).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).\n- can: isotp: set max pdu size to 64 kbyte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: fix comment (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).\n- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).\n- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).\n- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).\n- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).\n- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).\n- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).\n- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).\n- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).\n- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.\n- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use c syntax highlight in driver.rst (bsc#1215458).\n- documentation: networking: correct possessive 'its' (bsc#1215458).\n- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).\n- drm/amd/display: avoid null dereference of timing generator (git-fixes).\n- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).\n- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).\n- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).\n- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).\n- drm/amd: update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).\n- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).\n- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).\n- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).\n- drm/amdgpu: do not use atrm for external devices (git-fixes).\n- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).\n- drm/amdgpu: remove unnecessary domain argument (git-fixes).\n- drm/amdgpu: reserve fences for vm update (git-fixes).\n- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).\n- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: tc358768: clean up clock period code (git-fixes).\n- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: fix bit updates (git-fixes).\n- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).\n- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).\n- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).\n- drm/bridge: tc358768: remove unused variable (git-fixes).\n- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).\n- drm/bridge: tc358768: use dev for dbg prints, not priv->dev (git-fixes).\n- drm/bridge: tc358768: use struct videomode (git-fixes).\n- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).\n- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).\n- drm/gud: use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).\n- drm/i915: fix potential spectre vulnerability (git-fixes).\n- drm/i915: flush wc ggtt only on required platforms (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).\n- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: create devm device attachment (git-fixes).\n- drm/mipi-dsi: create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).\n- drm/msm/dsi: free tx buffer in unbind (git-fixes).\n- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).\n- drm/panel: st7703: pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).\n- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).\n- drm/ttm: reorder sys manager cleanup step (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)\n- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)\n- drm: bridge: it66121: fix invalid connector dereference (git-fixes).\n- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]\n- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: omapfb: drop unused remove function (git-fixes).\n- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- fix termination state for idr_for_each_entry_ul() (git-fixes).\n- fix x86/mm: print the encryption features in hyperv is disabled\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- gpu: host1x: correct allocated size for contexts (git-fixes).\n- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).\n- hid: cp2112: fix duplicate workqueue initialization (git-fixes).\n- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- hid: hyperv: remove unused struct synthhid_msg (git-fixes).\n- hid: hyperv: replace one-element array with flexible-array member (git-fixes).\n- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).\n- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).\n- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).\n- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).\n- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).\n- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).\n- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).\n- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).\n- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).\n- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and mac filter support (bsc#1215458).\n- idpf: add rx splitq napi poll support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: add sriov support and other ndo_ops (bsc#1215458).\n- idpf: add tx splitq napi poll support (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for rx queues (bsc#1215458).\n- idpf: configure resources for tx queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).\n- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).\n- input: xpad - add vid for turtle beach controllers (git-fixes).\n- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).\n- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).\n- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.\n- kernel-source: move provides after sources\n- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).\n- leds: pwm: do not disable the pwm when the led should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: do not use smbus calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: correctly initialise try compose rectangle (git-fixes).\n- media: ccs: fix driver quirk struct documentation (git-fixes).\n- media: cedrus: fix clock/reset sequence (git-fixes).\n- media: cobalt: use field_get() to extract link width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).\n- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).\n- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).\n- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).\n- mmc: block: retry commands in cqe error recovery (git-fixes).\n- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).\n- mmc: cqhci: increase recovery halt timeout (git-fixes).\n- mmc: cqhci: warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).\n- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).\n- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).\n- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee module_device_table built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).\n- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).\n- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: avoid address overwrite in kernel_connect (bsc#1216861).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nfs: fix access to page->mapping (bsc#1216788).\n- nvme: update firmware version after commit (bsc#1215292).\n- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).\n- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).\n- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).\n- pci: extract ats disabling to a helper function (bsc#1215458).\n- pci: exynos: do not discard .remove() callback (git-fixes).\n- pci: keystone: do not discard .probe() callback (git-fixes).\n- pci: keystone: do not discard .remove() callback (git-fixes).\n- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).\n- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).\n- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).\n- pci: use field_get() to extract link width (git-fixes).\n- pci: vmd: correct pci header type register's multi-function check (git-fixes).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).\n- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).\n- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).\n- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).\n- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).\n- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).\n- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).\n- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).\n- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).\n- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).\n- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).\n- platform/x86/intel/vsec: add tpmi id (bsc#1217147).\n- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).\n- platform/x86/intel/vsec: support private data (bsc#1217147).\n- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).\n- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).\n- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).\n- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).\n- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).\n- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).\n- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).\n- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).\n- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).\n- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).\n- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).\n- platform/x86: wmi: fix opening of char device (git-fixes).\n- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).\n- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).\n- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).\n- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).\n- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).\n- pwm: fix double shift bug (git-fixes).\n- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).\n- quota: fix slow quotaoff (bsc#1216621).\n- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: release firmware if we have an error in probe (git-fixes).\n- r8152: run the unload routine if we have errors during probe (git-fixes).\n- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).\n- regmap: ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).\n- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).\n- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036) \n- revert amdgpu patches that caused a regression (bsc#1215802) \n- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.\n- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.\n- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage\n- run scripts/renamepatches for sle15-sp4\n- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).\n- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).\n- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).\n- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).\n- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).\n- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).\n- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).\n- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).\n- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).\n- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: fix ksft print formats (git-fixes).\n- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).\n- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).\n- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).\n- tty: 8250: add support for additional brainboxes px cards (git-fixes).\n- tty: 8250: add support for additional brainboxes uc cards (git-fixes).\n- tty: 8250: add support for brainboxes up cards (git-fixes).\n- tty: 8250: add support for intashield is-100 (git-fixes).\n- tty: 8250: add support for intashield ix cards (git-fixes).\n- tty: 8250: fix port count of px-257 (git-fixes).\n- tty: 8250: fix up px-803/px-857 (git-fixes).\n- tty: 8250: remove uc-257 and uc-431 (git-fixes).\n- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).\n- update ath11k hibernation fix patch set (bsc#1207948) \n- update metadata s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).\n- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).\n- usb: chipidea: fix dma overwrite for tegra (git-fixes).\n- usb: chipidea: simplify tegra dma alignment code (git-fixes).\n- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc2: write hcint with intmask applied (bsc#1214286).\n- usb: dwc3: fix default mode initialization (git-fixes).\n- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).\n- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: serial: option: add fibocom l7xx modules (git-fixes).\n- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).\n- usb: serial: option: fix fm101r-gl defines (git-fixes).\n- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).\n- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).\n- usb: usbip: fix stub_dev hub disconnect (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix gtk offload status event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).\n- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).\n- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).\n- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).\n- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).\n- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: make hv_get_nmi_reason public (git-fixes).\n- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).\n- x86/sev: fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).\n- x86: move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert agf log flags to unsigned (git-fixes).\n- xfs: convert agi log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize ag block number formatting in ftrace output (git-fixes).\n- xfs: standardize ag number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n- xhci: enable rpm on controllers that support low-power states (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4732,SUSE-SLE-Micro-5.5-2023-4732,SUSE-SLE-Module-Live-Patching-15-SP5-2023-4732,SUSE-SLE-Module-RT-15-SP5-2023-4732,openSUSE-SLE-15.5-2023-4732", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4732-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4732-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234732-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4732-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1212649", url: "https://bugzilla.suse.com/1212649", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214700", url: "https://bugzilla.suse.com/1214700", }, { category: "self", summary: "SUSE Bug 1214840", url: "https://bugzilla.suse.com/1214840", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215095", url: "https://bugzilla.suse.com/1215095", }, { category: "self", summary: "SUSE Bug 1215123", url: "https://bugzilla.suse.com/1215123", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1215802", url: "https://bugzilla.suse.com/1215802", }, { category: "self", summary: "SUSE Bug 1215931", url: "https://bugzilla.suse.com/1215931", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216527", url: "https://bugzilla.suse.com/1216527", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216621", url: "https://bugzilla.suse.com/1216621", }, { category: "self", summary: "SUSE Bug 1216687", url: "https://bugzilla.suse.com/1216687", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216761", url: "https://bugzilla.suse.com/1216761", }, { category: "self", summary: "SUSE Bug 1216788", url: "https://bugzilla.suse.com/1216788", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217095", url: "https://bugzilla.suse.com/1217095", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217147", url: "https://bugzilla.suse.com/1217147", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217196", url: "https://bugzilla.suse.com/1217196", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217511", url: "https://bugzilla.suse.com/1217511", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-3777 page", url: "https://www.suse.com/security/cve/CVE-2023-3777/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46813 page", url: "https://www.suse.com/security/cve/CVE-2023-46813/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5633 page", url: "https://www.suse.com/security/cve/CVE-2023-5633/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:14:52Z", generator: { date: "2023-12-12T14:14:52Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4732-1", initial_release_date: "2023-12-12T14:14:52Z", revision_history: [ { date: "2023-12-12T14:14:52Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", product: { name: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", product_id: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", product: { name: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", product_id: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", product: { name: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", product_id: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", product: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", product_id: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", product: { name: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", product_id: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", product: { name: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", product_id: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.5", product: { name: "SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP5", product: { name: "SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp5", }, }, }, { category: "product_name", name: "SUSE Real Time Module 15 SP5", product: { name: "SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150500.13.27.2.noarch as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", }, product_reference: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150500.13.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150500.13.27.2.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", }, product_reference: "kernel-source-rt-5.14.21-150500.13.27.2.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", }, product_reference: "reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-3777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3777", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3777", url: "https://www.suse.com/security/cve/CVE-2023-3777", }, { category: "external", summary: "SUSE Bug 1215095 for CVE-2023-3777", url: "https://bugzilla.suse.com/1215095", }, { category: "external", summary: "SUSE Bug 1215097 for CVE-2023-3777", url: "https://bugzilla.suse.com/1215097", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-3777", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46813", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46813", url: "https://www.suse.com/security/cve/CVE-2023-46813", }, { category: "external", summary: "SUSE Bug 1212649 for CVE-2023-46813", url: "https://bugzilla.suse.com/1212649", }, { category: "external", summary: "SUSE Bug 1216896 for CVE-2023-46813", url: "https://bugzilla.suse.com/1216896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-46813", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5633", }, ], notes: [ { category: "general", text: "The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5633", url: "https://www.suse.com/security/cve/CVE-2023-5633", }, { category: "external", summary: "SUSE Bug 1216527 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216527", }, { category: "external", summary: "SUSE Bug 1216645 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-5633", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-1-150500.11.3.2.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.27.2.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.27.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.27.2.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.27.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:52Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4734-1
Vulnerability from csaf_suse
Published
2023-12-12 14:15
Modified
2023-12-12 14:15
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
The following non-security bugs were fixed:
- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).
- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).
- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).
- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).
- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).
- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).
- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).
- alsa: hda/realtek: add quirks for hp laptops (git-fixes).
- alsa: hda/realtek: add support dual speaker for dell (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).
- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).
- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).
- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).
- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).
- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).
- alsa: info: fix potential deadlock at disconnection (git-fixes).
- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: add cortex-a520 cpu part definition (git-fixes)
- arm64: allow kprobes on el0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass esr_elx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out el1 ssbs emulation hook (git-fixes)
- arm64: report el1 undefs better (git-fixes)
- arm64: rework bti exception handling (git-fixes)
- arm64: rework el0 mrs emulation (git-fixes)
- arm64: rework fpac exception handling (git-fixes)
- arm64: split el0/el1 undef handlers (git-fixes)
- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- asoc: ams-delta.c: use component after check (git-fixes).
- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).
- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).
- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).
- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).
- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).
- asoc: rt5650: fix the wrong result of key button (git-fixes).
- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).
- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).
- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).
- atl1c: work around the dma rx overflow issue (git-fixes).
- atm: iphase: do pci error checks on own line (git-fixes).
- blk-mq: do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: add device 0bda:887b to device tables (git-fixes).
- bluetooth: add device 13d3:3571 to device tables (git-fixes).
- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).
- bluetooth: btusb: add date->evt_skb is null check (git-fixes).
- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).
- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).
- btrfs: always log symlinks in full mode (bsc#1214840).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).
- can: isotp: set max pdu size to 64 kbyte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: fix comment (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).
- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).
- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).
- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).
- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).
- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).
- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).
- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).
- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).
- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).
- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.
- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- doc/readme.suse: adjust heading style (jsc#ped-5021) * underscore all headings as a preparation for markdown conversion. * use title-style capitalization for the document name and sentence-style capitalization for section headings, as recommended in the current suse documentation style guide.
- doc/readme.suse: bring information about compiling up to date (jsc#ped-5021) * when building the kernel, do not mention to initially change the current directory to /usr/src/linux because later description discourages it and specifies to use 'make -c /usr/src/linux'. * avoid writing additional details in parentheses, incorporate them instead properly in the text. * fix the obsolete name of /etc/modprobe.d/unsupported-modules -> /etc/modprobe.d/10-unsupported-modules.conf. * drop a note that a newly built kernel should be added to the boot manager because that normally happens automatically when running 'make install'. * update a link to the kernel module packages manual. * when preparing a build for external modules, mention use of the upstream recommended 'make modules_prepare' instead of a pair of 'make prepare' + 'make scripts'. * fix some typos+grammar.
- doc/readme.suse: bring the overview section up to date (jsc#ped-5021) * update information in the overview section that was no longer accurate. * improve wording and fix some typos+grammar.
- doc/readme.suse: convert the document to markdown (jsc#ped-5021)
- doc/readme.suse: minor content clean up (jsc#ped-5021) * mark the user's build directory as a variable, not a command: 'make -c $(your_build_dir)' -> 'make -c $your_build_dir'. * unify how to get the current directory: 'm=$(pwd)' -> 'm=$pwd'. * 'git' / 'git' -> 'git'.
- doc/readme.suse: reflow text to 80-column width (jsc#ped-5021)
- doc/readme.suse: update information about (un)supported modules (jsc#ped-5021) * update the list of taint flags. convert it to a table that matches the upstream documentation format and describe specifically flags that are related to module support status. * fix some typos and wording.
- doc/readme.suse: update information about config files (jsc#ped-5021) * use version variables to describe a name of the /boot/config-... file instead of using specific example versions which get outdated quickly. * replace removed silentoldconfig with oldconfig. * mention that oldconfig can automatically pick a base config from '/boot/config-$(uname -r)'. * avoid writing additional details in parentheses, incorporate them instead properly in the text.
- doc/readme.suse: update information about custom patches (jsc#ped-5021) * replace mention of various patches.* directories with only patches.suse as the typical location for patches. * replace i386 with x86_64 in the example how to define a config addon. * fix some typos and wording.
- doc/readme.suse: update information about dud (jsc#ped-5021) remove a dead link to description of device update disks found previously on novell.com. replace it with a short section summarizing what dud is and reference the mkdud + mksusecd tools and their documentation for more information.
- doc/readme.suse: update information about module paths (jsc#ped-5021) * use version variables to describe names of the /lib/modules/$version-$release-$flavor/... directories instead of using specific example versions which get outdated quickly. * note: keep the /lib/modules/ prefix instead of using the new /usr/lib/modules/ location for now. the updated readme is expected to be incorporated to various branches that are not yet usrmerged.
- doc/readme.suse: update the references list (jsc#ped-5021) * remove the reference to linux documentation project. it has been inactive for years and mostly contains old manuals that are not relevant for contemporary systems and hardware. * update the name and link to lwn.net. the original name 'linux weekly news' has been deemphasized over time by its authors. * update the link to kernel newbies website. * update the reference to the linux kernel module programming guide. the document has not been updated for over a decade but it looks its content is still relevant for today. * point kernel module packages manual to the current version. * add a reference to suse soliddriver program.
- doc/readme.suse: update title information (jsc#ped-5021) * drop the mention of kernel versions from the readme title. * remove information about the original authors of the document. rely as in case of other readmes on git metadata to get information about all contributions. * strip the table of contents. the document is short and easy to navigate just by scrolling through it.
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use c syntax highlight in driver.rst (bsc#1215458).
- documentation: networking: correct possessive 'its' (bsc#1215458).
- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).
- drm/amd/display: avoid null dereference of timing generator (git-fixes).
- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).
- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).
- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).
- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).
- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: do not use atrm for external devices (git-fixes).
- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).
- drm/amdgpu: remove unnecessary domain argument (git-fixes).
- drm/amdgpu: reserve fences for vm update (git-fixes).
- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).
- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).
- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: tc358768: clean up clock period code (git-fixes).
- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: fix bit updates (git-fixes).
- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).
- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).
- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).
- drm/bridge: tc358768: remove unused variable (git-fixes).
- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).
- drm/bridge: tc358768: use dev for dbg prints, not priv->dev (git-fixes).
- drm/bridge: tc358768: use struct videomode (git-fixes).
- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).
- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).
- drm/gud: use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).
- drm/i915: fix potential spectre vulnerability (git-fixes).
- drm/i915: flush wc ggtt only on required platforms (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).
- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: create devm device attachment (git-fixes).
- drm/mipi-dsi: create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).
- drm/msm/dsi: free tx buffer in unbind (git-fixes).
- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).
- drm/panel: st7703: pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).
- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).
- drm/ttm: reorder sys manager cleanup step (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)
- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)
- drm: bridge: it66121: fix invalid connector dereference (git-fixes).
- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]
- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: omapfb: drop unused remove function (git-fixes).
- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- fix termination state for idr_for_each_entry_ul() (git-fixes).
- fix x86/mm: print the encryption features in hyperv is disabled
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- gpu: host1x: correct allocated size for contexts (git-fixes).
- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).
- hid: cp2112: fix duplicate workqueue initialization (git-fixes).
- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).
- hid: hyperv: remove unused struct synthhid_msg (git-fixes).
- hid: hyperv: replace one-element array with flexible-array member (git-fixes).
- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).
- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).
- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).
- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).
- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).
- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).
- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).
- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).
- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).
- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and mac filter support (bsc#1215458).
- idpf: add rx splitq napi poll support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: add sriov support and other ndo_ops (bsc#1215458).
- idpf: add tx splitq napi poll support (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for rx queues (bsc#1215458).
- idpf: configure resources for tx queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).
- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).
- input: xpad - add vid for turtle beach controllers (git-fixes).
- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.
- kernel-source: move provides after sources
- leds: pwm: do not disable the pwm when the led should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: do not use smbus calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: correctly initialise try compose rectangle (git-fixes).
- media: ccs: fix driver quirk struct documentation (git-fixes).
- media: cedrus: fix clock/reset sequence (git-fixes).
- media: cobalt: use field_get() to extract link width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).
- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: fix double put in dln2_probe (git-fixes).
- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).
- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).
- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).
- mmc: block: retry commands in cqe error recovery (git-fixes).
- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).
- mmc: cqhci: increase recovery halt timeout (git-fixes).
- mmc: cqhci: warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).
- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).
- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).
- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee module_device_table built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).
- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).
- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: avoid address overwrite in kernel_connect (bsc#1216861).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nfs: fix access to page->mapping (bsc#1216788).
- nvme: update firmware version after commit (bsc#1215292).
- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).
- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).
- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).
- pci: extract ats disabling to a helper function (bsc#1215458).
- pci: exynos: do not discard .remove() callback (git-fixes).
- pci: keystone: do not discard .probe() callback (git-fixes).
- pci: keystone: do not discard .remove() callback (git-fixes).
- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).
- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).
- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).
- pci: use field_get() to extract link width (git-fixes).
- pci: vmd: correct pci header type register's multi-function check (git-fixes).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).
- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).
- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).
- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).
- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).
- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).
- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).
- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).
- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).
- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).
- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).
- platform/x86/intel/vsec: add tpmi id (bsc#1217147).
- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).
- platform/x86/intel/vsec: support private data (bsc#1217147).
- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).
- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).
- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).
- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).
- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).
- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).
- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).
- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).
- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).
- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).
- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).
- platform/x86: wmi: fix opening of char device (git-fixes).
- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).
- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).
- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).
- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).
- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).
- pwm: fix double shift bug (git-fixes).
- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).
- r8152: release firmware if we have an error in probe (git-fixes).
- r8152: run the unload routine if we have errors during probe (git-fixes).
- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).
- regmap: ensure range selector registers are updated after cache sync (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).
- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).
- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036)
- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.
- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.
- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage
- run scripts/renamepatches for sle15-sp4
- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).
- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).
- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).
- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).
- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).
- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).
- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).
- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).
- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).
- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: fix ksft print formats (git-fixes).
- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).
- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).
- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).
- tty: 8250: add support for additional brainboxes px cards (git-fixes).
- tty: 8250: add support for additional brainboxes uc cards (git-fixes).
- tty: 8250: add support for brainboxes up cards (git-fixes).
- tty: 8250: add support for intashield is-100 (git-fixes).
- tty: 8250: add support for intashield ix cards (git-fixes).
- tty: 8250: fix port count of px-257 (git-fixes).
- tty: 8250: fix up px-803/px-857 (git-fixes).
- tty: 8250: remove uc-257 and uc-431 (git-fixes).
- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).
- update metadata patches.suse/s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).
- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).
- usb: chipidea: fix dma overwrite for tegra (git-fixes).
- usb: chipidea: simplify tegra dma alignment code (git-fixes).
- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc2: write hcint with intmask applied (bsc#1214286).
- usb: dwc3: fix default mode initialization (git-fixes).
- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).
- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: serial: option: add fibocom l7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).
- usb: serial: option: fix fm101r-gl defines (git-fixes).
- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).
- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).
- usb: usbip: fix stub_dev hub disconnect (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix gtk offload status event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).
- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).
- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).
- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).
- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).
- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).
- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: make hv_get_nmi_reason public (git-fixes).
- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).
- x86/sev: fix calculation of end address based on number of pages (git-fixes).
- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).
- x86: move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert agf log flags to unsigned (git-fixes).
- xfs: convert agi log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize ag block number formatting in ftrace output (git-fixes).
- xfs: standardize ag number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
- xhci: enable rpm on controllers that support low-power states (git-fixes).
Patchnames
SUSE-2023-4734,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4734,openSUSE-SLE-15.5-2023-4734
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n\nThe following non-security bugs were fixed:\n\n- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).\n- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).\n- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).\n- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).\n- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).\n- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).\n- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).\n- alsa: hda/realtek: add quirks for hp laptops (git-fixes).\n- alsa: hda/realtek: add support dual speaker for dell (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).\n- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).\n- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).\n- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).\n- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).\n- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).\n- alsa: info: fix potential deadlock at disconnection (git-fixes).\n- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: add cortex-a520 cpu part definition (git-fixes)\n- arm64: allow kprobes on el0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass esr_elx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out el1 ssbs emulation hook (git-fixes)\n- arm64: report el1 undefs better (git-fixes)\n- arm64: rework bti exception handling (git-fixes)\n- arm64: rework el0 mrs emulation (git-fixes)\n- arm64: rework fpac exception handling (git-fixes)\n- arm64: split el0/el1 undef handlers (git-fixes)\n- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- asoc: ams-delta.c: use component after check (git-fixes).\n- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).\n- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).\n- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).\n- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).\n- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).\n- asoc: rt5650: fix the wrong result of key button (git-fixes).\n- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).\n- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).\n- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: work around the dma rx overflow issue (git-fixes).\n- atm: iphase: do pci error checks on own line (git-fixes).\n- blk-mq: do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: add device 0bda:887b to device tables (git-fixes).\n- bluetooth: add device 13d3:3571 to device tables (git-fixes).\n- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).\n- bluetooth: btusb: add date->evt_skb is null check (git-fixes).\n- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).\n- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).\n- btrfs: always log symlinks in full mode (bsc#1214840).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).\n- can: isotp: set max pdu size to 64 kbyte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: fix comment (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).\n- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).\n- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).\n- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).\n- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).\n- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).\n- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).\n- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).\n- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).\n- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.\n- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- doc/readme.suse: adjust heading style (jsc#ped-5021) * underscore all headings as a preparation for markdown conversion. * use title-style capitalization for the document name and sentence-style capitalization for section headings, as recommended in the current suse documentation style guide.\n- doc/readme.suse: bring information about compiling up to date (jsc#ped-5021) * when building the kernel, do not mention to initially change the current directory to /usr/src/linux because later description discourages it and specifies to use 'make -c /usr/src/linux'. * avoid writing additional details in parentheses, incorporate them instead properly in the text. * fix the obsolete name of /etc/modprobe.d/unsupported-modules -> /etc/modprobe.d/10-unsupported-modules.conf. * drop a note that a newly built kernel should be added to the boot manager because that normally happens automatically when running 'make install'. * update a link to the kernel module packages manual. * when preparing a build for external modules, mention use of the upstream recommended 'make modules_prepare' instead of a pair of 'make prepare' + 'make scripts'. * fix some typos+grammar.\n- doc/readme.suse: bring the overview section up to date (jsc#ped-5021) * update information in the overview section that was no longer accurate. * improve wording and fix some typos+grammar.\n- doc/readme.suse: convert the document to markdown (jsc#ped-5021)\n- doc/readme.suse: minor content clean up (jsc#ped-5021) * mark the user's build directory as a variable, not a command: 'make -c $(your_build_dir)' -> 'make -c $your_build_dir'. * unify how to get the current directory: 'm=$(pwd)' -> 'm=$pwd'. * 'git' / 'git' -> 'git'.\n- doc/readme.suse: reflow text to 80-column width (jsc#ped-5021)\n- doc/readme.suse: update information about (un)supported modules (jsc#ped-5021) * update the list of taint flags. convert it to a table that matches the upstream documentation format and describe specifically flags that are related to module support status. * fix some typos and wording.\n- doc/readme.suse: update information about config files (jsc#ped-5021) * use version variables to describe a name of the /boot/config-... file instead of using specific example versions which get outdated quickly. * replace removed silentoldconfig with oldconfig. * mention that oldconfig can automatically pick a base config from '/boot/config-$(uname -r)'. * avoid writing additional details in parentheses, incorporate them instead properly in the text.\n- doc/readme.suse: update information about custom patches (jsc#ped-5021) * replace mention of various patches.* directories with only patches.suse as the typical location for patches. * replace i386 with x86_64 in the example how to define a config addon. * fix some typos and wording.\n- doc/readme.suse: update information about dud (jsc#ped-5021) remove a dead link to description of device update disks found previously on novell.com. replace it with a short section summarizing what dud is and reference the mkdud + mksusecd tools and their documentation for more information.\n- doc/readme.suse: update information about module paths (jsc#ped-5021) * use version variables to describe names of the /lib/modules/$version-$release-$flavor/... directories instead of using specific example versions which get outdated quickly. * note: keep the /lib/modules/ prefix instead of using the new /usr/lib/modules/ location for now. the updated readme is expected to be incorporated to various branches that are not yet usrmerged.\n- doc/readme.suse: update the references list (jsc#ped-5021) * remove the reference to linux documentation project. it has been inactive for years and mostly contains old manuals that are not relevant for contemporary systems and hardware. * update the name and link to lwn.net. the original name 'linux weekly news' has been deemphasized over time by its authors. * update the link to kernel newbies website. * update the reference to the linux kernel module programming guide. the document has not been updated for over a decade but it looks its content is still relevant for today. * point kernel module packages manual to the current version. * add a reference to suse soliddriver program.\n- doc/readme.suse: update title information (jsc#ped-5021) * drop the mention of kernel versions from the readme title. * remove information about the original authors of the document. rely as in case of other readmes on git metadata to get information about all contributions. * strip the table of contents. the document is short and easy to navigate just by scrolling through it.\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use c syntax highlight in driver.rst (bsc#1215458).\n- documentation: networking: correct possessive 'its' (bsc#1215458).\n- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).\n- drm/amd/display: avoid null dereference of timing generator (git-fixes).\n- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).\n- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).\n- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).\n- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).\n- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).\n- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).\n- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).\n- drm/amdgpu: do not use atrm for external devices (git-fixes).\n- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).\n- drm/amdgpu: remove unnecessary domain argument (git-fixes).\n- drm/amdgpu: reserve fences for vm update (git-fixes).\n- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).\n- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: tc358768: clean up clock period code (git-fixes).\n- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: fix bit updates (git-fixes).\n- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).\n- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).\n- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).\n- drm/bridge: tc358768: remove unused variable (git-fixes).\n- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).\n- drm/bridge: tc358768: use dev for dbg prints, not priv->dev (git-fixes).\n- drm/bridge: tc358768: use struct videomode (git-fixes).\n- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).\n- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).\n- drm/gud: use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).\n- drm/i915: fix potential spectre vulnerability (git-fixes).\n- drm/i915: flush wc ggtt only on required platforms (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).\n- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: create devm device attachment (git-fixes).\n- drm/mipi-dsi: create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).\n- drm/msm/dsi: free tx buffer in unbind (git-fixes).\n- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).\n- drm/panel: st7703: pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).\n- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).\n- drm/ttm: reorder sys manager cleanup step (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)\n- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)\n- drm: bridge: it66121: fix invalid connector dereference (git-fixes).\n- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]\n- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: omapfb: drop unused remove function (git-fixes).\n- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- fix termination state for idr_for_each_entry_ul() (git-fixes).\n- fix x86/mm: print the encryption features in hyperv is disabled\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- gpu: host1x: correct allocated size for contexts (git-fixes).\n- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).\n- hid: cp2112: fix duplicate workqueue initialization (git-fixes).\n- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- hid: hyperv: remove unused struct synthhid_msg (git-fixes).\n- hid: hyperv: replace one-element array with flexible-array member (git-fixes).\n- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).\n- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).\n- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).\n- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).\n- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).\n- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).\n- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).\n- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).\n- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).\n- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and mac filter support (bsc#1215458).\n- idpf: add rx splitq napi poll support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: add sriov support and other ndo_ops (bsc#1215458).\n- idpf: add tx splitq napi poll support (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for rx queues (bsc#1215458).\n- idpf: configure resources for tx queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).\n- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).\n- input: xpad - add vid for turtle beach controllers (git-fixes).\n- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).\n- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).\n- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.\n- kernel-source: move provides after sources\n- leds: pwm: do not disable the pwm when the led should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: do not use smbus calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: correctly initialise try compose rectangle (git-fixes).\n- media: ccs: fix driver quirk struct documentation (git-fixes).\n- media: cedrus: fix clock/reset sequence (git-fixes).\n- media: cobalt: use field_get() to extract link width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).\n- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).\n- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).\n- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).\n- mmc: block: retry commands in cqe error recovery (git-fixes).\n- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).\n- mmc: cqhci: increase recovery halt timeout (git-fixes).\n- mmc: cqhci: warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).\n- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).\n- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).\n- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee module_device_table built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).\n- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).\n- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: avoid address overwrite in kernel_connect (bsc#1216861).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nfs: fix access to page->mapping (bsc#1216788).\n- nvme: update firmware version after commit (bsc#1215292).\n- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).\n- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).\n- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).\n- pci: extract ats disabling to a helper function (bsc#1215458).\n- pci: exynos: do not discard .remove() callback (git-fixes).\n- pci: keystone: do not discard .probe() callback (git-fixes).\n- pci: keystone: do not discard .remove() callback (git-fixes).\n- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).\n- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).\n- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).\n- pci: use field_get() to extract link width (git-fixes).\n- pci: vmd: correct pci header type register's multi-function check (git-fixes).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).\n- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).\n- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).\n- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).\n- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).\n- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).\n- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).\n- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).\n- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).\n- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).\n- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).\n- platform/x86/intel/vsec: add tpmi id (bsc#1217147).\n- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).\n- platform/x86/intel/vsec: support private data (bsc#1217147).\n- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).\n- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).\n- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).\n- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).\n- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).\n- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).\n- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).\n- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).\n- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).\n- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).\n- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).\n- platform/x86: wmi: fix opening of char device (git-fixes).\n- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).\n- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).\n- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).\n- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).\n- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).\n- pwm: fix double shift bug (git-fixes).\n- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: release firmware if we have an error in probe (git-fixes).\n- r8152: run the unload routine if we have errors during probe (git-fixes).\n- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).\n- regmap: ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).\n- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).\n- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036) \n- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.\n- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.\n- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage\n- run scripts/renamepatches for sle15-sp4\n- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).\n- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).\n- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).\n- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).\n- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).\n- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).\n- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).\n- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).\n- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).\n- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: fix ksft print formats (git-fixes).\n- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).\n- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).\n- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).\n- tty: 8250: add support for additional brainboxes px cards (git-fixes).\n- tty: 8250: add support for additional brainboxes uc cards (git-fixes).\n- tty: 8250: add support for brainboxes up cards (git-fixes).\n- tty: 8250: add support for intashield is-100 (git-fixes).\n- tty: 8250: add support for intashield ix cards (git-fixes).\n- tty: 8250: fix port count of px-257 (git-fixes).\n- tty: 8250: fix up px-803/px-857 (git-fixes).\n- tty: 8250: remove uc-257 and uc-431 (git-fixes).\n- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).\n- update metadata patches.suse/s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).\n- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).\n- usb: chipidea: fix dma overwrite for tegra (git-fixes).\n- usb: chipidea: simplify tegra dma alignment code (git-fixes).\n- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc2: write hcint with intmask applied (bsc#1214286).\n- usb: dwc3: fix default mode initialization (git-fixes).\n- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).\n- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: serial: option: add fibocom l7xx modules (git-fixes).\n- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).\n- usb: serial: option: fix fm101r-gl defines (git-fixes).\n- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).\n- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).\n- usb: usbip: fix stub_dev hub disconnect (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix gtk offload status event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).\n- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).\n- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).\n- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).\n- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).\n- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: make hv_get_nmi_reason public (git-fixes).\n- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).\n- x86/sev: fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).\n- x86: move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert agf log flags to unsigned (git-fixes).\n- xfs: convert agi log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize ag block number formatting in ftrace output (git-fixes).\n- xfs: standardize ag number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n- xhci: enable rpm on controllers that support low-power states (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4734,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4734,openSUSE-SLE-15.5-2023-4734", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4734-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4734-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234734-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4734-1", url: "https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214700", url: "https://bugzilla.suse.com/1214700", }, { category: "self", summary: "SUSE Bug 1214840", url: "https://bugzilla.suse.com/1214840", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215123", url: "https://bugzilla.suse.com/1215123", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1215802", url: "https://bugzilla.suse.com/1215802", }, { category: "self", summary: "SUSE Bug 1215931", url: "https://bugzilla.suse.com/1215931", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216527", url: "https://bugzilla.suse.com/1216527", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216687", url: "https://bugzilla.suse.com/1216687", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216788", url: "https://bugzilla.suse.com/1216788", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217095", url: "https://bugzilla.suse.com/1217095", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217147", url: "https://bugzilla.suse.com/1217147", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217196", url: "https://bugzilla.suse.com/1217196", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217511", url: "https://bugzilla.suse.com/1217511", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5633 page", url: "https://www.suse.com/security/cve/CVE-2023-5633/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:15:51Z", generator: { date: "2023-12-12T14:15:51Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4734-1", initial_release_date: "2023-12-12T14:15:51Z", revision_history: [ { date: "2023-12-12T14:15:51Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", product_id: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", product: { name: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", product_id: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", product: { name: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", product_id: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", product_id: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.26.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.26.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.26.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.26.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5633", }, ], notes: [ { category: "general", text: "The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5633", url: "https://www.suse.com/security/cve/CVE-2023-5633", }, { category: "external", summary: "SUSE Bug 1216527 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216527", }, { category: "external", summary: "SUSE Bug 1216645 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-5633", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.26.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.26.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:15:51Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4883-1
Vulnerability from csaf_suse
Published
2023-12-15 10:41
Modified
2023-12-15 10:41
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
The following non-security bugs were fixed:
- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214408).
- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214408).
- cpu/SMT: Remove topology_smt_supported() (bsc#1214408).
- cpu/SMT: Store the current/max number of threads (bsc#1214408).
- cpu/hotplug: Create SMT sysfs interface for all arches (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- dm-raid: remove useless checking in raid_message() (git-fixes).
- l2tp: fix refcount leakage on PPPoL2TP sockets (git-fixes).
- l2tp: fix {pppol2tp, l2tp_dfs}_seq_stop() in case of seq_file overflow (git-fixes).
- md/bitmap: always wake up md_thread in timeout_store (git-fixes).
- md/bitmap: factor out a helper to set timeout (git-fixes).
- md/raid10: Do not add spare disk when recovery fails (git-fixes).
- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).
- md/raid10: clean up md_add_new_disk() (git-fixes).
- md/raid10: fix io loss while replacement replace rdev (git-fixes).
- md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes).
- md/raid10: fix memleak for 'conf->bio_split' (git-fixes).
- md/raid10: fix memleak of md thread (git-fixes).
- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).
- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).
- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).
- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).
- md/raid10: improve code of mrdev in raid10_sync_request (git-fixes).
- md/raid10: prevent soft lockup while flush writes (git-fixes).
- md/raid10: prioritize adding disk to 'removed' mirror (git-fixes).
- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).
- md: add new workqueue for delete rdev (git-fixes).
- md: avoid signed overflow in slot_store() (git-fixes).
- md: do not return existing mddevs from mddev_find_or_alloc (git-fixes).
- md: factor out a mddev_alloc_unit helper from mddev_find (git-fixes).
- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).
- md: fix deadlock causing by sysfs_notify (git-fixes).
- md: fix incorrect declaration about claim_rdev in md_import_device (git-fixes).
- md: flush md_rdev_misc_wq for HOT_ADD_DISK case (git-fixes).
- md: get sysfs entry after redundancy attr group create (git-fixes).
- md: refactor mddev_find_or_alloc (git-fixes).
- md: remove lock_bdev / unlock_bdev (git-fixes).
- mm, memcg: add mem_cgroup_disabled checks in vmpressure and swap-related functions (bsc#1190208 (MM functional and performance backports) bsc#1216759).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).
- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.
- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217607).
- s390/cmma: fix detection of DAT pages (LTC#203996 bsc#1217087).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203996 bsc#1217087).
- s390/cmma: fix initial kernel address space page table walk (LTC#203996 bsc#1217087).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217206).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217519).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217604).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203996 bsc#1217087).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203996 bsc#1217087).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217603).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1216031).
- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).
- usb: serial: option: add Quectel RM500U-CN modem (git-fixes).
- usb: serial: option: add Telit FE990 compositions (git-fixes).
- usb: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).
- usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail (git-fixes).
- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).
- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).
- xfs: reserve data and rt quota at the same time (bsc#1203496).
Patchnames
SUSE-2023-4883,SUSE-SLE-SERVER-12-SP5-2023-4883
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n\nThe following non-security bugs were fixed:\n\n- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214408).\n- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214408).\n- cpu/SMT: Remove topology_smt_supported() (bsc#1214408).\n- cpu/SMT: Store the current/max number of threads (bsc#1214408).\n- cpu/hotplug: Create SMT sysfs interface for all arches (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- dm-raid: remove useless checking in raid_message() (git-fixes).\n- l2tp: fix refcount leakage on PPPoL2TP sockets (git-fixes).\n- l2tp: fix {pppol2tp, l2tp_dfs}_seq_stop() in case of seq_file overflow (git-fixes).\n- md/bitmap: always wake up md_thread in timeout_store (git-fixes).\n- md/bitmap: factor out a helper to set timeout (git-fixes).\n- md/raid10: Do not add spare disk when recovery fails (git-fixes).\n- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).\n- md/raid10: clean up md_add_new_disk() (git-fixes).\n- md/raid10: fix io loss while replacement replace rdev (git-fixes).\n- md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes).\n- md/raid10: fix memleak for 'conf->bio_split' (git-fixes).\n- md/raid10: fix memleak of md thread (git-fixes).\n- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).\n- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).\n- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).\n- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).\n- md/raid10: improve code of mrdev in raid10_sync_request (git-fixes).\n- md/raid10: prevent soft lockup while flush writes (git-fixes).\n- md/raid10: prioritize adding disk to 'removed' mirror (git-fixes).\n- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).\n- md: add new workqueue for delete rdev (git-fixes).\n- md: avoid signed overflow in slot_store() (git-fixes).\n- md: do not return existing mddevs from mddev_find_or_alloc (git-fixes).\n- md: factor out a mddev_alloc_unit helper from mddev_find (git-fixes).\n- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).\n- md: fix deadlock causing by sysfs_notify (git-fixes).\n- md: fix incorrect declaration about claim_rdev in md_import_device (git-fixes).\n- md: flush md_rdev_misc_wq for HOT_ADD_DISK case (git-fixes).\n- md: get sysfs entry after redundancy attr group create (git-fixes).\n- md: refactor mddev_find_or_alloc (git-fixes).\n- md: remove lock_bdev / unlock_bdev (git-fixes).\n- mm, memcg: add mem_cgroup_disabled checks in vmpressure and swap-related functions (bsc#1190208 (MM functional and performance backports) bsc#1216759).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: mana: Configure hwc timeout from hardware (bsc#1214037).\n- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).\n- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.\n- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217607).\n- s390/cmma: fix detection of DAT pages (LTC#203996 bsc#1217087).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203996 bsc#1217087).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203996 bsc#1217087).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217206).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217519).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217604).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203996 bsc#1217087).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203996 bsc#1217087).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217603).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1216031).\n- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).\n- usb: serial: option: add Quectel RM500U-CN modem (git-fixes).\n- usb: serial: option: add Telit FE990 compositions (git-fixes).\n- usb: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).\n- usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail (git-fixes).\n- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).\n- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).\n- xfs: reserve data and rt quota at the same time (bsc#1203496).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4883,SUSE-SLE-SERVER-12-SP5-2023-4883", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4883-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4883-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234883-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4883-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html", }, { category: "self", summary: "SUSE Bug 1176950", url: "https://bugzilla.suse.com/1176950", }, { category: "self", summary: "SUSE Bug 1190208", url: "https://bugzilla.suse.com/1190208", }, { category: "self", summary: "SUSE Bug 1203496", url: "https://bugzilla.suse.com/1203496", }, { category: "self", summary: "SUSE Bug 1205462", url: "https://bugzilla.suse.com/1205462", }, { category: "self", summary: "SUSE Bug 1208787", url: "https://bugzilla.suse.com/1208787", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1214037", url: "https://bugzilla.suse.com/1214037", }, { category: "self", summary: "SUSE Bug 1214285", url: "https://bugzilla.suse.com/1214285", }, { category: "self", summary: "SUSE Bug 1214408", url: "https://bugzilla.suse.com/1214408", }, { category: "self", summary: "SUSE Bug 1214764", url: "https://bugzilla.suse.com/1214764", }, { category: "self", summary: "SUSE Bug 1216031", url: "https://bugzilla.suse.com/1216031", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217087", url: "https://bugzilla.suse.com/1217087", }, { category: "self", summary: "SUSE Bug 1217206", url: "https://bugzilla.suse.com/1217206", }, { category: "self", summary: "SUSE Bug 1217519", url: "https://bugzilla.suse.com/1217519", }, { category: "self", summary: "SUSE Bug 1217525", url: "https://bugzilla.suse.com/1217525", }, { category: "self", summary: "SUSE Bug 1217603", url: "https://bugzilla.suse.com/1217603", }, { category: "self", summary: "SUSE Bug 1217604", url: "https://bugzilla.suse.com/1217604", }, { category: "self", summary: "SUSE Bug 1217607", url: "https://bugzilla.suse.com/1217607", }, { category: "self", summary: "SUSE CVE CVE-2023-0461 page", url: "https://www.suse.com/security/cve/CVE-2023-0461/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-15T10:41:00Z", generator: { date: "2023-12-15T10:41:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4883-1", initial_release_date: "2023-12-15T10:41:00Z", revision_history: [ { date: "2023-12-15T10:41:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-16.160.1.noarch", product: { name: "kernel-devel-azure-4.12.14-16.160.1.noarch", product_id: "kernel-devel-azure-4.12.14-16.160.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-16.160.1.noarch", product: { name: "kernel-source-azure-4.12.14-16.160.1.noarch", product_id: "kernel-source-azure-4.12.14-16.160.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-4.12.14-16.160.1.x86_64", product: { name: "cluster-md-kmp-azure-4.12.14-16.160.1.x86_64", product_id: "cluster-md-kmp-azure-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-4.12.14-16.160.1.x86_64", product: { name: "dlm-kmp-azure-4.12.14-16.160.1.x86_64", product_id: "dlm-kmp-azure-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-4.12.14-16.160.1.x86_64", product: { name: "gfs2-kmp-azure-4.12.14-16.160.1.x86_64", product_id: "gfs2-kmp-azure-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-4.12.14-16.160.1.x86_64", product: { name: "kernel-azure-4.12.14-16.160.1.x86_64", product_id: "kernel-azure-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-16.160.1.x86_64", product: { name: "kernel-azure-base-4.12.14-16.160.1.x86_64", product_id: "kernel-azure-base-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-16.160.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-16.160.1.x86_64", product_id: "kernel-azure-devel-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-4.12.14-16.160.1.x86_64", product: { name: "kernel-azure-extra-4.12.14-16.160.1.x86_64", product_id: "kernel-azure-extra-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-kgraft-devel-4.12.14-16.160.1.x86_64", product: { name: "kernel-azure-kgraft-devel-4.12.14-16.160.1.x86_64", product_id: "kernel-azure-kgraft-devel-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-16.160.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-16.160.1.x86_64", product_id: "kernel-syms-azure-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-4.12.14-16.160.1.x86_64", product: { name: "kselftests-kmp-azure-4.12.14-16.160.1.x86_64", product_id: "kselftests-kmp-azure-4.12.14-16.160.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-4.12.14-16.160.1.x86_64", product: { name: "ocfs2-kmp-azure-4.12.14-16.160.1.x86_64", product_id: "ocfs2-kmp-azure-4.12.14-16.160.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-16.160.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", }, product_reference: "kernel-azure-4.12.14-16.160.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-16.160.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-16.160.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-16.160.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-16.160.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-16.160.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-16.160.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-16.160.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-16.160.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-16.160.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-16.160.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-16.160.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", }, product_reference: "kernel-azure-4.12.14-16.160.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-16.160.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-16.160.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-16.160.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-16.160.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-16.160.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-16.160.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-16.160.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-16.160.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-16.160.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-16.160.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-0461", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0461", }, ], notes: [ { category: "general", text: "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0461", url: "https://www.suse.com/security/cve/CVE-2023-0461", }, { category: "external", summary: "SUSE Bug 1208787 for CVE-2023-0461", url: "https://bugzilla.suse.com/1208787", }, { category: "external", summary: "SUSE Bug 1208911 for CVE-2023-0461", url: "https://bugzilla.suse.com/1208911", }, { category: "external", summary: "SUSE Bug 1211833 for CVE-2023-0461", url: "https://bugzilla.suse.com/1211833", }, { category: "external", summary: "SUSE Bug 1217079 for CVE-2023-0461", url: "https://bugzilla.suse.com/1217079", }, { category: "external", summary: "SUSE Bug 1218514 for CVE-2023-0461", url: "https://bugzilla.suse.com/1218514", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:41:00Z", details: "important", }, ], title: "CVE-2023-0461", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:41:00Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:41:00Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:41:00Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:41:00Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:41:00Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.160.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.160.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.160.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:41:00Z", details: "important", }, ], title: "CVE-2023-5717", }, ], }
suse-su-2023:4783-1
Vulnerability from csaf_suse
Published
2023-12-13 12:41
Modified
2023-12-13 12:41
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
The following non-security bugs were fixed:
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
Patchnames
SUSE-2023-4783,SUSE-SLE-Module-Live-Patching-15-SP2-2023-4783,SUSE-SLE-Product-HA-15-SP2-2023-4783,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4783,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4783,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4783
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n\nThe following non-security bugs were fixed:\n\n- net: mana: Configure hwc timeout from hardware (bsc#1214037).\n- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4783,SUSE-SLE-Module-Live-Patching-15-SP2-2023-4783,SUSE-SLE-Product-HA-15-SP2-2023-4783,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4783,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4783,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4783", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4783-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4783-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234783-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4783-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1214037", url: "https://bugzilla.suse.com/1214037", }, { category: "self", summary: "SUSE Bug 1214344", url: "https://bugzilla.suse.com/1214344", }, { category: "self", summary: "SUSE Bug 1214764", url: "https://bugzilla.suse.com/1214764", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-13T12:41:03Z", generator: { date: "2023-12-13T12:41:03Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4783-1", initial_release_date: "2023-12-13T12:41:03Z", revision_history: [ { date: "2023-12-13T12:41:03Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", product_id: "dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-default-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-default-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", product: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", product_id: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-default-devel-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-default-devel-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-default-extra-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-default-extra-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-obs-build-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-obs-build-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-obs-qa-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-preempt-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-preempt-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.172.1.aarch64", product: { name: "kernel-syms-5.3.18-150200.24.172.1.aarch64", product_id: "kernel-syms-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.172.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150200.24.172.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150200.24.172.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150200.24.172.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150200.24.172.1.noarch", product: { name: "kernel-devel-5.3.18-150200.24.172.1.noarch", product_id: "kernel-devel-5.3.18-150200.24.172.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150200.24.172.1.noarch", product: { name: "kernel-docs-5.3.18-150200.24.172.1.noarch", product_id: "kernel-docs-5.3.18-150200.24.172.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150200.24.172.1.noarch", product: { name: "kernel-docs-html-5.3.18-150200.24.172.1.noarch", product_id: "kernel-docs-html-5.3.18-150200.24.172.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150200.24.172.1.noarch", product: { name: "kernel-macros-5.3.18-150200.24.172.1.noarch", product_id: "kernel-macros-5.3.18-150200.24.172.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150200.24.172.1.noarch", product: { name: "kernel-source-5.3.18-150200.24.172.1.noarch", product_id: "kernel-source-5.3.18-150200.24.172.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150200.24.172.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-150200.24.172.1.noarch", product_id: "kernel-source-vanilla-5.3.18-150200.24.172.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-debug-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-debug-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-default-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-default-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", product: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", product_id: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-default-extra-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", product_id: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.172.1.ppc64le", product: { name: "kernel-syms-5.3.18-150200.24.172.1.ppc64le", product_id: "kernel-syms-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.172.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150200.24.172.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.172.1.s390x", product: { name: "dlm-kmp-default-5.3.18-150200.24.172.1.s390x", product_id: "dlm-kmp-default-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", product_id: "gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.172.1.s390x", product: { name: "kernel-default-5.3.18-150200.24.172.1.s390x", product_id: "kernel-default-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", product: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", product_id: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.172.1.s390x", product: { name: "kernel-default-devel-5.3.18-150200.24.172.1.s390x", product_id: "kernel-default-devel-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.172.1.s390x", product: { name: "kernel-default-extra-5.3.18-150200.24.172.1.s390x", product_id: "kernel-default-extra-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", product_id: "kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", product: { name: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", product_id: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.172.1.s390x", product: { name: "kernel-obs-build-5.3.18-150200.24.172.1.s390x", product_id: "kernel-obs-build-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.172.1.s390x", product: { name: "kernel-obs-qa-5.3.18-150200.24.172.1.s390x", product_id: "kernel-obs-qa-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.172.1.s390x", product: { name: "kernel-syms-5.3.18-150200.24.172.1.s390x", product_id: "kernel-syms-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150200.24.172.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-150200.24.172.1.s390x", product_id: "kernel-zfcpdump-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.172.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-150200.24.172.1.s390x", product_id: "kselftests-kmp-default-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", product_id: "dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-debug-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-debug-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-debug-devel-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-default-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-default-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", product: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", product_id: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-default-devel-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-default-devel-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-default-extra-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-default-extra-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_172-preempt-1-150200.5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150200_24_172-preempt-1-150200.5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150200_24_172-preempt-1-150200.5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-obs-build-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-obs-build-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-obs-qa-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-preempt-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-preempt-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.172.1.x86_64", product: { name: "kernel-syms-5.3.18-150200.24.172.1.x86_64", product_id: "kernel-syms-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.172.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150200.24.172.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150200.24.172.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150200.24.172.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP2", product: { name: "SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-default-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-default-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", }, product_reference: "kernel-default-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", }, product_reference: "kernel-syms-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.172.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.172.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:41:03Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:41:03Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:41:03Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:41:03Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:41:03Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:41:03Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.172.1.150200.9.87.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.172.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.172.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.172.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:41:03Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4882-1
Vulnerability from csaf_suse
Published
2023-12-15 10:40
Modified
2023-12-15 10:40
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
Patchnames
SUSE-2023-4882,SUSE-SLE-Module-Live-Patching-15-SP1-2023-4882,SUSE-SLE-Product-HA-15-SP1-2023-4882,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4882,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4882,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4882,openSUSE-SLE-15.4-2023-4882
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4882,SUSE-SLE-Module-Live-Patching-15-SP1-2023-4882,SUSE-SLE-Product-HA-15-SP1-2023-4882,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4882,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4882,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4882,openSUSE-SLE-15.4-2023-4882", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4882-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4882-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234882-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4882-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1208787", url: "https://bugzilla.suse.com/1208787", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE CVE CVE-2023-0461 page", url: "https://www.suse.com/security/cve/CVE-2023-0461/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-15T10:40:45Z", generator: { date: "2023-12-15T10:40:45Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4882-1", initial_release_date: "2023-12-15T10:40:45Z", revision_history: [ { date: "2023-12-15T10:40:45Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", product_id: "dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-default-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-default-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-default-base-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-default-base-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-default-devel-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-default-devel-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-default-extra-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-default-extra-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-default-livepatch-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-default-livepatch-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-obs-build-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-obs-build-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-obs-qa-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-syms-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-syms-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-vanilla-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-vanilla-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.aarch64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.aarch64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150100.197.165.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-150100.197.165.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", product: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", product_id: "reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-150100.197.165.1.noarch", product: { name: "kernel-devel-4.12.14-150100.197.165.1.noarch", product_id: "kernel-devel-4.12.14-150100.197.165.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-150100.197.165.1.noarch", product: { name: "kernel-docs-4.12.14-150100.197.165.1.noarch", product_id: "kernel-docs-4.12.14-150100.197.165.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-150100.197.165.1.noarch", product: { name: "kernel-docs-html-4.12.14-150100.197.165.1.noarch", product_id: "kernel-docs-html-4.12.14-150100.197.165.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-150100.197.165.1.noarch", product: { name: "kernel-macros-4.12.14-150100.197.165.1.noarch", product_id: "kernel-macros-4.12.14-150100.197.165.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-150100.197.165.1.noarch", product: { name: "kernel-source-4.12.14-150100.197.165.1.noarch", product_id: "kernel-source-4.12.14-150100.197.165.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-150100.197.165.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-150100.197.165.1.noarch", product_id: "kernel-source-vanilla-4.12.14-150100.197.165.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-debug-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-debug-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-debug-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-default-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-default-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-default-base-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-default-base-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-default-extra-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", product_id: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-syms-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-syms-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-vanilla-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150100.197.165.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-150100.197.165.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", product: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", product_id: "reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150100.197.165.1.s390x", product: { name: "dlm-kmp-default-4.12.14-150100.197.165.1.s390x", product_id: "dlm-kmp-default-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", product_id: "gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-default-4.12.14-150100.197.165.1.s390x", product_id: "kernel-default-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-default-base-4.12.14-150100.197.165.1.s390x", product_id: "kernel-default-base-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-default-devel-4.12.14-150100.197.165.1.s390x", product_id: "kernel-default-devel-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-default-extra-4.12.14-150100.197.165.1.s390x", product_id: "kernel-default-extra-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-default-livepatch-4.12.14-150100.197.165.1.s390x", product_id: "kernel-default-livepatch-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.s390x", product_id: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-default-man-4.12.14-150100.197.165.1.s390x", product_id: "kernel-default-man-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-obs-build-4.12.14-150100.197.165.1.s390x", product_id: "kernel-obs-build-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-obs-qa-4.12.14-150100.197.165.1.s390x", product_id: "kernel-obs-qa-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-syms-4.12.14-150100.197.165.1.s390x", product_id: "kernel-syms-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-vanilla-4.12.14-150100.197.165.1.s390x", product_id: "kernel-vanilla-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-150100.197.165.1.s390x", product_id: "kernel-vanilla-base-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-150100.197.165.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.s390x", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-150100.197.165.1.s390x", product_id: "kernel-zfcpdump-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150100.197.165.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-150100.197.165.1.s390x", product_id: "kselftests-kmp-default-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", product: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", product_id: "reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", product_id: "dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-debug-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-debug-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-debug-base-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-debug-base-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-debug-devel-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-debug-livepatch-devel-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-debug-livepatch-devel-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-default-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-default-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-default-base-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-default-base-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-default-devel-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-default-devel-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-default-extra-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-default-extra-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", product: { name: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", product_id: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-obs-build-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-obs-build-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-obs-qa-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-syms-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-syms-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-vanilla-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-vanilla-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.x86_64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.x86_64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150100.197.165.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-150100.197.165.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", product: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", product_id: "reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP1", product: { name: "SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP1", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-default-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-devel-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-docs-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-macros-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-source-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-syms-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-default-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-default-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", }, product_reference: "kernel-default-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", }, product_reference: "kernel-default-base-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", }, product_reference: "kernel-default-man-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-devel-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-docs-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-macros-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-source-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", }, product_reference: "kernel-syms-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", }, product_reference: "kernel-syms-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-default-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-devel-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-docs-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-macros-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150100.197.165.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", }, product_reference: "kernel-source-4.12.14-150100.197.165.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-base-4.12.14-150100.197.165.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", }, product_reference: "kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-base-4.12.14-150100.197.165.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-debug-base-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-150100.197.165.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", }, product_reference: "kernel-default-man-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", }, product_reference: "kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", }, product_reference: "kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2023-0461", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0461", }, ], notes: [ { category: "general", text: "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2023-0461", url: "https://www.suse.com/security/cve/CVE-2023-0461", }, { category: "external", summary: "SUSE Bug 1208787 for CVE-2023-0461", url: "https://bugzilla.suse.com/1208787", }, { category: "external", summary: "SUSE Bug 1208911 for CVE-2023-0461", url: "https://bugzilla.suse.com/1208911", }, { category: "external", summary: "SUSE Bug 1211833 for CVE-2023-0461", url: "https://bugzilla.suse.com/1211833", }, { category: "external", summary: "SUSE Bug 1217079 for CVE-2023-0461", url: "https://bugzilla.suse.com/1217079", }, { category: "external", summary: "SUSE Bug 1218514 for CVE-2023-0461", url: "https://bugzilla.suse.com/1218514", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:40:45Z", details: "important", }, ], title: "CVE-2023-0461", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:40:45Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:40:45Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:40:45Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:40:45Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:40:45Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_165-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.165.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.165.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.165.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.165.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.165.1.s390x", ], }, ], threats: [ { category: "impact", date: "2023-12-15T10:40:45Z", details: "important", }, ], title: "CVE-2023-5717", }, ], }
suse-su-2023:4730-1
Vulnerability from csaf_suse
Published
2023-12-12 14:12
Modified
2023-12-12 14:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
The following non-security bugs were fixed:
- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).
- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).
- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- ALSA: hda/realtek - ALC287 Realtek I2S speaker platform support (git-fixes).
- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).
- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX7602ZM (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS 2024 Zenbooks (git-fixes).
- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).
- ALSA: hda/realtek: Add support dual speaker for Dell (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).
- ALSA: hda: ASUS UM5302LA: Added quirks for cs35L41/10431A83 on i2c bus (git-fixes).
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).
- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).
- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).
- ALSA: info: Fix potential deadlock at disconnection (git-fixes).
- ALSA: usb-audio: add quirk flag to enable native DSD for McIntosh devices (git-fixes).
- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).
- ASoC: SOF: core: Ensure sof_ops_free() is still called when probe never ran (git-fixes).
- ASoC: ams-delta.c: use component after check (git-fixes).
- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).
- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).
- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).
- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).
- ASoC: rt5650: fix the wrong result of key button (git-fixes).
- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).
- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).
- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).
- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).
- Documentation: networking: correct possessive 'its' (bsc#1215458).
- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).
- Fix termination state for idr_for_each_entry_ul() (git-fixes).
- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).
- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).
- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).
- HID: hyperv: remove unused struct synthhid_msg (git-fixes).
- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).
- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).
- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).
- Input: xpad - add VID for Turtle Beach controllers (git-fixes).
- NFS: Fix access to page->mapping (bsc#1216788).
- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).
- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).
- PCI: Extract ATS disabling to a helper function (bsc#1215458).
- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).
- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).
- PCI: Use FIELD_GET() to extract Link Width (git-fixes).
- PCI: exynos: Do not discard .remove() callback (git-fixes).
- PCI: keystone: Do not discard .probe() callback (git-fixes).
- PCI: keystone: Do not discard .remove() callback (git-fixes).
- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).
- PCI: vmd: Correct PCI Header Type Register's multi-function check (git-fixes).
- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).
- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).
- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).
- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).
- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- USB: serial: option: add Fibocom L7xx modules (git-fixes).
- USB: serial: option: add Luat Air72*U series products (git-fixes).
- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- USB: usbip: fix stub_dev hub disconnect (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: Add Cortex-A520 CPU part definition (git-fixes)
- arm64: allow kprobes on EL0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass ESR_ELx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out EL1 SSBS emulation hook (git-fixes)
- arm64: report EL1 UNDEFs better (git-fixes)
- arm64: rework BTI exception handling (git-fixes)
- arm64: rework EL0 MRS emulation (git-fixes)
- arm64: rework FPAC exception handling (git-fixes)
- arm64: split EL0/EL1 UNDEF handlers (git-fixes)
- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).
- atl1c: Work around the DMA RX overflow issue (git-fixes).
- atm: iphase: Do PCI error checks on own line (git-fixes).
- blk-mq: Do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: Add device 0bda:887b to device tables (git-fixes).
- bluetooth: Add device 13d3:3571 to device tables (git-fixes).
- btrfs: always log symlinks in full mode (bsc#1214840).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).
- can: isotp: set max PDU size to 64 kByte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: Fix comment (git-fixes).
- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).
- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).
- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).
- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: Fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).
- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).
- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).
- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clocksource/drivers/timer-atmel-tcb: Fix initialization on SAM9 hardware (git-fixes).
- clocksource/drivers/timer-imx-gpt: Fix potential memory leak (git-fixes).
- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).
- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).
- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).
- drm/amd/display: Refactor dm_get_plane_scale helper (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).
- drm/amd: Disable ASPM for VI w/ all Intel systems (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).
- drm/amd: Move helper for dynamic speed switch check out of smu13 (git-fixes).
- drm/amd: Update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).
- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).
- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: Remove unnecessary domain argument (git-fixes).
- drm/amdgpu: Reserve fences for VM update (git-fixes).
- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: do not use ATRM for external devices (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdgpu: not to save bo in the case of RAS err_event_athub (git-fixes).
- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).
- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).
- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: tc358768: Clean up clock period code (git-fixes).
- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: Fix bit updates (git-fixes).
- drm/bridge: tc358768: Fix tc358768_ns_to_cnt() (git-fixes).
- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).
- drm/bridge: tc358768: Print logical values, not raw register values (git-fixes).
- drm/bridge: tc358768: Rename dsibclk to hsbyteclk (git-fixes).
- drm/bridge: tc358768: Use dev for dbg prints, not priv->dev (git-fixes).
- drm/bridge: tc358768: Use struct videomode (git-fixes).
- drm/bridge: tc358768: remove unused variable (git-fixes).
- drm/dp_mst: Fix NULL deref in get_mst_branch_device_by_guid_helper() (git-fixes).
- drm/gma500: Fix call trace when psb_gem_mm_init() fails (git-fixes).
- drm/gud: Use size_add() in call to struct_size() (git-fixes).
- drm/i915: Fix potential spectre vulnerability (git-fixes).
- drm/i915: Flush WC GGTT only on required platforms (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).
- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: Create devm device attachment (git-fixes).
- drm/mipi-dsi: Create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).
- drm/msm/dsi: free TX buffer in unbind (git-fixes).
- drm/msm/dsi: use msm_gem_kernel_put to free TX buffer (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).
- drm/panel: st7703: Pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).
- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).
- drm/ttm: Reorder sys manager cleanup step (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm/vmwgfx: Remove the duplicate bo_free function (bsc#1216527)
- drm/vmwgfx: Rename vmw_buffer_object to vmw_bo (bsc#1216527)
- drm: bridge: it66121: Fix invalid connector dereference (git-fixes).
- drm: mediatek: mtk_dsi: Fix NO_EOT_PACKET settings/handling (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: omapfb: Drop unused remove function (git-fixes).
- fbdev: uvesafb: Call cn_del_callback() at the end of uvesafb_exit() (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- gpu: host1x: Correct allocated size for contexts (git-fixes).
- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).
- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).
- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).
- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).
- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: Fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).
- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).
- idpf: add RX splitq napi poll support (bsc#1215458).
- idpf: add SRIOV support and other ndo_ops (bsc#1215458).
- idpf: add TX splitq napi poll support (bsc#1215458).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and MAC filter support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for RX queues (bsc#1215458).
- idpf: configure resources for TX queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).
- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: Do not use SMBUS calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: Correctly initialise try compose rectangle (git-fixes).
- media: ccs: Fix driver quirk struct documentation (git-fixes).
- media: cedrus: Fix clock/reset sequence (git-fixes).
- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: Fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: Add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).
- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: Fix double put in dln2_probe (git-fixes).
- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).
- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).
- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).
- mmc: block: Retry commands in CQE error recovery (git-fixes).
- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).
- mmc: cqhci: Increase recovery halt timeout (git-fixes).
- mmc: cqhci: Warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).
- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).
- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).
- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: Avoid address overwrite in kernel_connect (bsc#1216861).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: mana: Fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86/intel-uncore-freq: Return error on write frequency (bsc#1217147).
- platform/x86/intel-uncore-freq: Split common and enumeration part (bsc#1217147).
- platform/x86/intel-uncore-freq: Support for cluster level controls (bsc#1217147).
- platform/x86/intel-uncore-freq: Uncore frequency control via TPMI (bsc#1217147).
- platform/x86/intel-uncore-freq: tpmi: Provide cluster level control (bsc#1217147).
- platform/x86/intel/tpmi: ADD tpmi external interface for tpmi feature drivers (bsc#1217147).
- platform/x86/intel/tpmi: Fix double free reported by Smatch (bsc#1217147).
- platform/x86/intel/tpmi: Process CPU package mapping (bsc#1217147).
- platform/x86/intel/uncore-freq: Display uncore current frequency (bsc#1217147).
- platform/x86/intel/uncore-freq: Move to uncore-frequency folder (bsc#1217147).
- platform/x86/intel/uncore-freq: Use sysfs API to create attributes (bsc#1217147).
- platform/x86/intel/vsec: Add TPMI ID (bsc#1217147).
- platform/x86/intel/vsec: Enhance and Export intel_vsec_add_aux() (bsc#1217147).
- platform/x86/intel/vsec: Support private data (bsc#1217147).
- platform/x86/intel/vsec: Use mutex for ida_alloc() and ida_free() (bsc#1217147).
- platform/x86/intel: Intel TPMI enumeration driver (bsc#1217147).
- platform/x86/intel: tpmi: Fix double free in tpmi_create_device() (bsc#1217147).
- platform/x86: intel-uncore-freq: Add client processors (bsc#1217147).
- platform/x86: intel-uncore-freq: Conditionally create attribute for read frequency (bsc#1217147).
- platform/x86: intel-uncore-freq: Prevent driver loading in guests (bsc#1217147).
- platform/x86: intel-uncore-freq: Use sysfs_emit() to instead of scnprintf() (bsc#1217147).
- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).
- platform/x86: intel-uncore-frequency: Move to intel sub-directory (bsc#1217147).
- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).
- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).
- platform/x86: wmi: Fix opening of char device (git-fixes).
- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- powerpc/perf/hv-24x7: Update domain value check (bsc#1215931).
- powerpc/vas: Limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: Fix double shift bug (git-fixes).
- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).
- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).
- regmap: Ensure range selector registers are updated after cache sync (git-fixes).
- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).
- s390/ipl: add missing IPL_TYPE_ECKD_DUMP case to ipl_init() (git-fixes bsc#1217511).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).
- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).
- sbitmap: fix up kABI for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).
- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).
- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).
- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).
- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: Fix ksft print formats (git-fixes).
- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).
- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).
- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).
- tty: 8250: Add support for Brainboxes UP cards (git-fixes).
- tty: 8250: Add support for Intashield IS-100 (git-fixes).
- tty: 8250: Add support for Intashield IX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).
- tty: 8250: Fix port count of PX-257 (git-fixes).
- tty: 8250: Fix up PX-803/PX-857 (git-fixes).
- tty: 8250: Remove UC-257 and UC-431 (git-fixes).
- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).
- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).
- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc3: Fix default mode initialization (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix gtk offload status event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).
- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: Clear SVM feature if disabled by BIOS (bsc#1214700).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).
- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).
- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).
- x86/sev: Fix calculation of end address based on number of pages (git-fixes).
- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert AGF log flags to unsigned (git-fixes).
- xfs: convert AGI log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize AG block number formatting in ftrace output (git-fixes).
- xfs: standardize AG number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Enable RPM on controllers that support low-power states (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
Patchnames
SUSE-2023-4730,SUSE-SLE-Micro-5.5-2023-4730,SUSE-SLE-Module-Basesystem-15-SP5-2023-4730,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4730,SUSE-SLE-Module-Legacy-15-SP5-2023-4730,SUSE-SLE-Module-Live-Patching-15-SP5-2023-4730,SUSE-SLE-Product-HA-15-SP5-2023-4730,SUSE-SLE-Product-WE-15-SP5-2023-4730,openSUSE-SLE-15.5-2023-4730
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n\nThe following non-security bugs were fixed:\n\n- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).\n- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).\n- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).\n- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- ALSA: hda/realtek - ALC287 Realtek I2S speaker platform support (git-fixes).\n- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).\n- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS UX7602ZM (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS 2024 Zenbooks (git-fixes).\n- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).\n- ALSA: hda/realtek: Add support dual speaker for Dell (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).\n- ALSA: hda: ASUS UM5302LA: Added quirks for cs35L41/10431A83 on i2c bus (git-fixes).\n- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).\n- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).\n- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).\n- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).\n- ALSA: info: Fix potential deadlock at disconnection (git-fixes).\n- ALSA: usb-audio: add quirk flag to enable native DSD for McIntosh devices (git-fixes).\n- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).\n- ASoC: SOF: core: Ensure sof_ops_free() is still called when probe never ran (git-fixes).\n- ASoC: ams-delta.c: use component after check (git-fixes).\n- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).\n- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).\n- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).\n- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).\n- ASoC: rt5650: fix the wrong result of key button (git-fixes).\n- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).\n- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).\n- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).\n- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).\n- Documentation: networking: correct possessive 'its' (bsc#1215458).\n- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).\n- Fix termination state for idr_for_each_entry_ul() (git-fixes).\n- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).\n- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).\n- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- HID: hyperv: remove unused struct synthhid_msg (git-fixes).\n- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).\n- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).\n- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).\n- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).\n- Input: xpad - add VID for Turtle Beach controllers (git-fixes).\n- NFS: Fix access to page->mapping (bsc#1216788).\n- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).\n- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).\n- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).\n- PCI: Extract ATS disabling to a helper function (bsc#1215458).\n- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).\n- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).\n- PCI: Use FIELD_GET() to extract Link Width (git-fixes).\n- PCI: exynos: Do not discard .remove() callback (git-fixes).\n- PCI: keystone: Do not discard .probe() callback (git-fixes).\n- PCI: keystone: Do not discard .remove() callback (git-fixes).\n- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).\n- PCI: vmd: Correct PCI Header Type Register's multi-function check (git-fixes).\n- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).\n- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).\n- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).\n- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).\n- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- USB: serial: option: add Fibocom L7xx modules (git-fixes).\n- USB: serial: option: add Luat Air72*U series products (git-fixes).\n- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).\n- USB: serial: option: fix FM101R-GL defines (git-fixes).\n- USB: usbip: fix stub_dev hub disconnect (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: Add Cortex-A520 CPU part definition (git-fixes)\n- arm64: allow kprobes on EL0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass ESR_ELx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out EL1 SSBS emulation hook (git-fixes)\n- arm64: report EL1 UNDEFs better (git-fixes)\n- arm64: rework BTI exception handling (git-fixes)\n- arm64: rework EL0 MRS emulation (git-fixes)\n- arm64: rework FPAC exception handling (git-fixes)\n- arm64: split EL0/EL1 UNDEF handlers (git-fixes)\n- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: Work around the DMA RX overflow issue (git-fixes).\n- atm: iphase: Do PCI error checks on own line (git-fixes).\n- blk-mq: Do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: Add device 0bda:887b to device tables (git-fixes).\n- bluetooth: Add device 13d3:3571 to device tables (git-fixes).\n- btrfs: always log symlinks in full mode (bsc#1214840).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).\n- can: isotp: set max PDU size to 64 kByte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: Fix comment (git-fixes).\n- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).\n- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).\n- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).\n- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: Fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).\n- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).\n- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- clocksource/drivers/timer-atmel-tcb: Fix initialization on SAM9 hardware (git-fixes).\n- clocksource/drivers/timer-imx-gpt: Fix potential memory leak (git-fixes).\n- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).\n- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).\n- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).\n- drm/amd/display: Refactor dm_get_plane_scale helper (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).\n- drm/amd: Disable ASPM for VI w/ all Intel systems (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).\n- drm/amd: Move helper for dynamic speed switch check out of smu13 (git-fixes).\n- drm/amd: Update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).\n- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).\n- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).\n- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: Remove unnecessary domain argument (git-fixes).\n- drm/amdgpu: Reserve fences for VM update (git-fixes).\n- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).\n- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).\n- drm/amdgpu: do not use ATRM for external devices (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdgpu: not to save bo in the case of RAS err_event_athub (git-fixes).\n- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).\n- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: tc358768: Clean up clock period code (git-fixes).\n- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: Fix bit updates (git-fixes).\n- drm/bridge: tc358768: Fix tc358768_ns_to_cnt() (git-fixes).\n- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).\n- drm/bridge: tc358768: Print logical values, not raw register values (git-fixes).\n- drm/bridge: tc358768: Rename dsibclk to hsbyteclk (git-fixes).\n- drm/bridge: tc358768: Use dev for dbg prints, not priv->dev (git-fixes).\n- drm/bridge: tc358768: Use struct videomode (git-fixes).\n- drm/bridge: tc358768: remove unused variable (git-fixes).\n- drm/dp_mst: Fix NULL deref in get_mst_branch_device_by_guid_helper() (git-fixes).\n- drm/gma500: Fix call trace when psb_gem_mm_init() fails (git-fixes).\n- drm/gud: Use size_add() in call to struct_size() (git-fixes).\n- drm/i915: Fix potential spectre vulnerability (git-fixes).\n- drm/i915: Flush WC GGTT only on required platforms (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).\n- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: Create devm device attachment (git-fixes).\n- drm/mipi-dsi: Create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).\n- drm/msm/dsi: free TX buffer in unbind (git-fixes).\n- drm/msm/dsi: use msm_gem_kernel_put to free TX buffer (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).\n- drm/panel: st7703: Pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).\n- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).\n- drm/ttm: Reorder sys manager cleanup step (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm/vmwgfx: Remove the duplicate bo_free function (bsc#1216527)\n- drm/vmwgfx: Rename vmw_buffer_object to vmw_bo (bsc#1216527)\n- drm: bridge: it66121: Fix invalid connector dereference (git-fixes).\n- drm: mediatek: mtk_dsi: Fix NO_EOT_PACKET settings/handling (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: omapfb: Drop unused remove function (git-fixes).\n- fbdev: uvesafb: Call cn_del_callback() at the end of uvesafb_exit() (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- gpu: host1x: Correct allocated size for contexts (git-fixes).\n- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).\n- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).\n- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).\n- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: Fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).\n- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add RX splitq napi poll support (bsc#1215458).\n- idpf: add SRIOV support and other ndo_ops (bsc#1215458).\n- idpf: add TX splitq napi poll support (bsc#1215458).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and MAC filter support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for RX queues (bsc#1215458).\n- idpf: configure resources for TX queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).\n- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: Do not use SMBUS calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: Correctly initialise try compose rectangle (git-fixes).\n- media: ccs: Fix driver quirk struct documentation (git-fixes).\n- media: cedrus: Fix clock/reset sequence (git-fixes).\n- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: Fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: Add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).\n- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: Fix double put in dln2_probe (git-fixes).\n- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).\n- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).\n- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).\n- mmc: block: Retry commands in CQE error recovery (git-fixes).\n- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).\n- mmc: cqhci: Increase recovery halt timeout (git-fixes).\n- mmc: cqhci: Warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).\n- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).\n- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).\n- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).\n- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: Avoid address overwrite in kernel_connect (bsc#1216861).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: mana: Fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- nvme: update firmware version after commit (bsc#1215292).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86/intel-uncore-freq: Return error on write frequency (bsc#1217147).\n- platform/x86/intel-uncore-freq: Split common and enumeration part (bsc#1217147).\n- platform/x86/intel-uncore-freq: Support for cluster level controls (bsc#1217147).\n- platform/x86/intel-uncore-freq: Uncore frequency control via TPMI (bsc#1217147).\n- platform/x86/intel-uncore-freq: tpmi: Provide cluster level control (bsc#1217147).\n- platform/x86/intel/tpmi: ADD tpmi external interface for tpmi feature drivers (bsc#1217147).\n- platform/x86/intel/tpmi: Fix double free reported by Smatch (bsc#1217147).\n- platform/x86/intel/tpmi: Process CPU package mapping (bsc#1217147).\n- platform/x86/intel/uncore-freq: Display uncore current frequency (bsc#1217147).\n- platform/x86/intel/uncore-freq: Move to uncore-frequency folder (bsc#1217147).\n- platform/x86/intel/uncore-freq: Use sysfs API to create attributes (bsc#1217147).\n- platform/x86/intel/vsec: Add TPMI ID (bsc#1217147).\n- platform/x86/intel/vsec: Enhance and Export intel_vsec_add_aux() (bsc#1217147).\n- platform/x86/intel/vsec: Support private data (bsc#1217147).\n- platform/x86/intel/vsec: Use mutex for ida_alloc() and ida_free() (bsc#1217147).\n- platform/x86/intel: Intel TPMI enumeration driver (bsc#1217147).\n- platform/x86/intel: tpmi: Fix double free in tpmi_create_device() (bsc#1217147).\n- platform/x86: intel-uncore-freq: Add client processors (bsc#1217147).\n- platform/x86: intel-uncore-freq: Conditionally create attribute for read frequency (bsc#1217147).\n- platform/x86: intel-uncore-freq: Prevent driver loading in guests (bsc#1217147).\n- platform/x86: intel-uncore-freq: Use sysfs_emit() to instead of scnprintf() (bsc#1217147).\n- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).\n- platform/x86: intel-uncore-frequency: Move to intel sub-directory (bsc#1217147).\n- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).\n- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).\n- platform/x86: wmi: Fix opening of char device (git-fixes).\n- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- powerpc/perf/hv-24x7: Update domain value check (bsc#1215931).\n- powerpc/vas: Limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: Fix double shift bug (git-fixes).\n- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).\n- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).\n- regmap: Ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).\n- s390/ipl: add missing IPL_TYPE_ECKD_DUMP case to ipl_init() (git-fixes bsc#1217511).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).\n- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).\n- sbitmap: fix up kABI for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).\n- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).\n- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).\n- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).\n- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: Fix ksft print formats (git-fixes).\n- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).\n- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).\n- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).\n- tty: 8250: Add support for Brainboxes UP cards (git-fixes).\n- tty: 8250: Add support for Intashield IS-100 (git-fixes).\n- tty: 8250: Add support for Intashield IX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).\n- tty: 8250: Fix port count of PX-257 (git-fixes).\n- tty: 8250: Fix up PX-803/PX-857 (git-fixes).\n- tty: 8250: Remove UC-257 and UC-431 (git-fixes).\n- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).\n- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).\n- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).\n- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).\n- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc3: Fix default mode initialization (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).\n- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix gtk offload status event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).\n- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: Clear SVM feature if disabled by BIOS (bsc#1214700).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).\n- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).\n- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).\n- x86/sev: Fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).\n- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert AGF log flags to unsigned (git-fixes).\n- xfs: convert AGI log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize AG block number formatting in ftrace output (git-fixes).\n- xfs: standardize AG number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Enable RPM on controllers that support low-power states (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4730,SUSE-SLE-Micro-5.5-2023-4730,SUSE-SLE-Module-Basesystem-15-SP5-2023-4730,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4730,SUSE-SLE-Module-Legacy-15-SP5-2023-4730,SUSE-SLE-Module-Live-Patching-15-SP5-2023-4730,SUSE-SLE-Product-HA-15-SP5-2023-4730,SUSE-SLE-Product-WE-15-SP5-2023-4730,openSUSE-SLE-15.5-2023-4730", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4730-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4730-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234730-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4730-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214700", url: "https://bugzilla.suse.com/1214700", }, { category: "self", summary: "SUSE Bug 1214840", url: "https://bugzilla.suse.com/1214840", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215123", url: "https://bugzilla.suse.com/1215123", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1215802", url: "https://bugzilla.suse.com/1215802", }, { category: "self", summary: "SUSE Bug 1215931", url: "https://bugzilla.suse.com/1215931", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216527", url: "https://bugzilla.suse.com/1216527", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216687", url: "https://bugzilla.suse.com/1216687", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216788", url: "https://bugzilla.suse.com/1216788", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217095", url: "https://bugzilla.suse.com/1217095", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217147", url: "https://bugzilla.suse.com/1217147", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217196", url: "https://bugzilla.suse.com/1217196", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217511", url: "https://bugzilla.suse.com/1217511", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5633 page", url: "https://www.suse.com/security/cve/CVE-2023-5633/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:12:25Z", generator: { date: "2023-12-12T14:12:25Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4730-1", initial_release_date: "2023-12-12T14:12:25Z", revision_history: [ { date: "2023-12-12T14:12:25Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-altera-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-altera-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-amazon-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-amazon-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-amazon-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-amd-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-amd-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-apm-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-apm-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-apple-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-apple-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-apple-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-arm-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-arm-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-cavium-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-cavium-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-exynos-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-exynos-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-freescale-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-freescale-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-lg-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-lg-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-marvell-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-marvell-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-qcom-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-qcom-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-renesas-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-renesas-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-socionext-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-socionext-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-sprd-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-sprd-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64", product: { name: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64", product_id: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", product: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", product_id: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", product: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", product_id: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.39.1.aarch64", product: { name: "kernel-syms-5.14.21-150500.55.39.1.aarch64", product_id: "kernel-syms-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product: { name: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", product_id: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", product_id: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-devel-5.14.21-150500.55.39.1.noarch", product_id: "kernel-devel-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-docs-5.14.21-150500.55.39.1.noarch", product_id: "kernel-docs-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-docs-html-5.14.21-150500.55.39.1.noarch", product_id: "kernel-docs-html-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-macros-5.14.21-150500.55.39.1.noarch", product_id: "kernel-macros-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-source-5.14.21-150500.55.39.1.noarch", product_id: "kernel-source-5.14.21-150500.55.39.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", product: { name: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", product_id: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-debug-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-debug-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", product: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", product_id: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", product_id: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", product: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", product_id: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", product: { name: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", product_id: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", product_id: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-extra-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-extra-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-default-optional-5.14.21-150500.55.39.1.s390x", product_id: "kernel-default-optional-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", product: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", product_id: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", product_id: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x", product_id: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-syms-5.14.21-150500.55.39.1.s390x", product_id: "kernel-syms-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", product: { name: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", product_id: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", product_id: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-debug-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-debug-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", product: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", product_id: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", product: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", product_id: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", product_id: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.39.1.x86_64", product: { name: "kernel-syms-5.14.21-150500.55.39.1.x86_64", product_id: "kernel-syms-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", product_id: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.5", product: { name: "SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP5", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP5", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP5", product: { name: "SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP5", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP5", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", product_id: "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150500.55.39.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-devel-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150500.55.39.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-macros-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150500.55.39.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-docs-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150500.55.39.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-source-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", }, product_reference: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-allwinner-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-altera-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-amazon-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-amazon-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-amd-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-amlogic-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-apm-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-apple-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-apple-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-arm-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-broadcom-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-cavium-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-exynos-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-freescale-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-lg-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-marvell-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-mediatek-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-nvidia-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-qcom-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-renesas-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-rockchip-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-socionext-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-sprd-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", }, product_reference: "dtb-xilinx-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-debug-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-debug-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, product_reference: "kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-default-optional-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-default-optional-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-optional-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-devel-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-docs-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-docs-html-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-macros-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-source-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", }, product_reference: "kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5633", }, ], notes: [ { category: "general", text: "The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5633", url: "https://www.suse.com/security/cve/CVE-2023-5633", }, { category: "external", summary: "SUSE Bug 1216527 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216527", }, { category: "external", summary: "SUSE Bug 1216645 for CVE-2023-5633", url: "https://bugzilla.suse.com/1216645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-5633", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-1-150500.11.3.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Micro 5.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Micro 5.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.39.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.39.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.39.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.39.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:12:25Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4731-1
Vulnerability from csaf_suse
Published
2023-12-12 14:14
Modified
2023-12-12 14:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
The following non-security bugs were fixed:
- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).
- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).
- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).
- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).
- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).
- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).
- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).
- ALSA: info: Fix potential deadlock at disconnection (git-fixes).
- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).
- ASoC: ams-delta.c: use component after check (git-fixes).
- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).
- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).
- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).
- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).
- ASoC: rt5650: fix the wrong result of key button (git-fixes).
- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).
- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).
- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).
- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).
- Disable Loongson drivers Loongson is a mips architecture, it does not make sense to build Loongson drivers on other architectures.
- Documentation: networking: correct possessive 'its' (bsc#1215458).
- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).
- Ensure ia32_emulation is always enabled for kernel-obs-build If ia32_emulation is disabled by default, ensure it is enabled back for OBS kernel to allow building 32bit binaries (jsc#PED-3184) [ms: Always pass the parameter, no need to grep through the config which may not be very reliable]
- Fix termination state for idr_for_each_entry_ul() (git-fixes).
- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).
- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).
- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).
- HID: hyperv: remove unused struct synthhid_msg (git-fixes).
- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).
- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).
- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).
- Input: xpad - add VID for Turtle Beach controllers (git-fixes).
- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).
- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).
- PCI: Extract ATS disabling to a helper function (bsc#1215458).
- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).
- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).
- PCI: Use FIELD_GET() to extract Link Width (git-fixes).
- PCI: exynos: Do not discard .remove() callback (git-fixes).
- PCI: keystone: Do not discard .probe() callback (git-fixes).
- PCI: keystone: Do not discard .remove() callback (git-fixes).
- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).
- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).
- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).
- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).
- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).
- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- USB: serial: option: add Fibocom L7xx modules (git-fixes).
- USB: serial: option: add Luat Air72*U series products (git-fixes).
- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- USB: usbip: fix stub_dev hub disconnect (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: Add Cortex-A520 CPU part definition (git-fixes)
- arm64: allow kprobes on EL0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass ESR_ELx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out EL1 SSBS emulation hook (git-fixes)
- arm64: report EL1 UNDEFs better (git-fixes)
- arm64: rework BTI exception handling (git-fixes)
- arm64: rework EL0 MRS emulation (git-fixes)
- arm64: rework FPAC exception handling (git-fixes)
- arm64: split EL0/EL1 UNDEF handlers (git-fixes)
- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).
- atl1c: Work around the DMA RX overflow issue (git-fixes).
- atm: iphase: Do PCI error checks on own line (git-fixes).
- blk-mq: Do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: Add device 0bda:887b to device tables (git-fixes).
- bluetooth: Add device 13d3:3571 to device tables (git-fixes).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).
- can: isotp: set max PDU size to 64 kByte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: Fix comment (git-fixes).
- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).
- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).
- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).
- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: Fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).
- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).
- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).
- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).
- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use C syntax highlight in driver.rst (bsc#1215458).
- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).
- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).
- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: do not use ATRM for external devices (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).
- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: Fix bit updates (git-fixes).
- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).
- drm/gud: Use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).
- drm/i915: Fix potential spectre vulnerability (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).
- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: Create devm device attachment (git-fixes).
- drm/mipi-dsi: Create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).
- drm/panel: st7703: Pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).
- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: omapfb: Drop unused remove function (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).
- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).
- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).
- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).
- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).
- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: Fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).
- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).
- idpf: add RX splitq napi poll support (bsc#1215458).
- idpf: add SRIOV support and other ndo_ops (bsc#1215458).
- idpf: add TX splitq napi poll support (bsc#1215458).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and MAC filter support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for RX queues (bsc#1215458).
- idpf: configure resources for TX queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).
- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) The rxrpc module is built since SLE15-SP3 but it is not shipped as part of any SLE product, only in Leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed Requires(pre) adds dependency for the specific sciptlet. However, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. Add plain Requires as well.
- kernel-source: Move provides after sources
- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).
- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).
- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: Do not use SMBUS calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: Correctly initialise try compose rectangle (git-fixes).
- media: ccs: Fix driver quirk struct documentation (git-fixes).
- media: cedrus: Fix clock/reset sequence (git-fixes).
- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: Fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: Add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).
- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: Fix double put in dln2_probe (git-fixes).
- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).
- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).
- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).
- mmc: block: Retry commands in CQE error recovery (git-fixes).
- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).
- mmc: cqhci: Increase recovery halt timeout (git-fixes).
- mmc: cqhci: Warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).
- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).
- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).
- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: Avoid address overwrite in kernel_connect (bsc#1216861).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: Fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).
- platform/x86: wmi: Fix opening of char device (git-fixes).
- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: Fix double shift bug (git-fixes).
- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).
- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).
- r8152: Release firmware if we have an error in probe (git-fixes).
- r8152: Run the unload routine if we have errors during probe (git-fixes).
- regmap: Ensure range selector registers are updated after cache sync (git-fixes).
- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).
- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).
- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).
- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).
- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: Fix ksft print formats (git-fixes).
- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).
- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).
- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: Spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).
- tty: 8250: Add support for Brainboxes UP cards (git-fixes).
- tty: 8250: Add support for Intashield IS-100 (git-fixes).
- tty: 8250: Add support for Intashield IX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).
- tty: 8250: Fix port count of PX-257 (git-fixes).
- tty: 8250: Fix up PX-803/PX-857 (git-fixes).
- tty: 8250: Remove UC-257 and UC-431 (git-fixes).
- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).
- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).
- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc3: Fix default mode initialization (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).
- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).
- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).
- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).
- x86/sev: Fix calculation of end address based on number of pages (git-fixes).
- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert AGF log flags to unsigned (git-fixes).
- xfs: convert AGI log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize AG block number formatting in ftrace output (git-fixes).
- xfs: standardize AG number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Enable RPM on controllers that support low-power states (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
Patchnames
SUSE-2023-4731,SUSE-SLE-Micro-5.3-2023-4731,SUSE-SLE-Micro-5.4-2023-4731,SUSE-SLE-Module-Live-Patching-15-SP4-2023-4731,SUSE-SLE-Module-RT-15-SP4-2023-4731,openSUSE-Leap-Micro-5.3-2023-4731,openSUSE-Leap-Micro-5.4-2023-4731,openSUSE-SLE-15.4-2023-4731
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n\nThe following non-security bugs were fixed:\n\n- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).\n- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).\n- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).\n- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).\n- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).\n- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).\n- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).\n- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).\n- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).\n- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).\n- ALSA: info: Fix potential deadlock at disconnection (git-fixes).\n- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).\n- ASoC: ams-delta.c: use component after check (git-fixes).\n- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).\n- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).\n- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).\n- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).\n- ASoC: rt5650: fix the wrong result of key button (git-fixes).\n- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).\n- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).\n- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).\n- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).\n- Disable Loongson drivers Loongson is a mips architecture, it does not make sense to build Loongson drivers on other architectures.\n- Documentation: networking: correct possessive 'its' (bsc#1215458).\n- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).\n- Ensure ia32_emulation is always enabled for kernel-obs-build If ia32_emulation is disabled by default, ensure it is enabled back for OBS kernel to allow building 32bit binaries (jsc#PED-3184) [ms: Always pass the parameter, no need to grep through the config which may not be very reliable]\n- Fix termination state for idr_for_each_entry_ul() (git-fixes).\n- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).\n- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).\n- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- HID: hyperv: remove unused struct synthhid_msg (git-fixes).\n- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).\n- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).\n- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).\n- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).\n- Input: xpad - add VID for Turtle Beach controllers (git-fixes).\n- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).\n- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).\n- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).\n- PCI: Extract ATS disabling to a helper function (bsc#1215458).\n- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).\n- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).\n- PCI: Use FIELD_GET() to extract Link Width (git-fixes).\n- PCI: exynos: Do not discard .remove() callback (git-fixes).\n- PCI: keystone: Do not discard .probe() callback (git-fixes).\n- PCI: keystone: Do not discard .remove() callback (git-fixes).\n- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).\n- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).\n- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).\n- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).\n- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).\n- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- USB: serial: option: add Fibocom L7xx modules (git-fixes).\n- USB: serial: option: add Luat Air72*U series products (git-fixes).\n- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).\n- USB: serial: option: fix FM101R-GL defines (git-fixes).\n- USB: usbip: fix stub_dev hub disconnect (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: Add Cortex-A520 CPU part definition (git-fixes)\n- arm64: allow kprobes on EL0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass ESR_ELx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out EL1 SSBS emulation hook (git-fixes)\n- arm64: report EL1 UNDEFs better (git-fixes)\n- arm64: rework BTI exception handling (git-fixes)\n- arm64: rework EL0 MRS emulation (git-fixes)\n- arm64: rework FPAC exception handling (git-fixes)\n- arm64: split EL0/EL1 UNDEF handlers (git-fixes)\n- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: Work around the DMA RX overflow issue (git-fixes).\n- atm: iphase: Do PCI error checks on own line (git-fixes).\n- blk-mq: Do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: Add device 0bda:887b to device tables (git-fixes).\n- bluetooth: Add device 13d3:3571 to device tables (git-fixes).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).\n- can: isotp: set max PDU size to 64 kByte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: Fix comment (git-fixes).\n- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).\n- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).\n- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).\n- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: Fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).\n- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).\n- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).\n- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use C syntax highlight in driver.rst (bsc#1215458).\n- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).\n- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).\n- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).\n- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: do not use ATRM for external devices (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: Fix bit updates (git-fixes).\n- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).\n- drm/gud: Use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).\n- drm/i915: Fix potential spectre vulnerability (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).\n- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: Create devm device attachment (git-fixes).\n- drm/mipi-dsi: Create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).\n- drm/panel: st7703: Pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).\n- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: omapfb: Drop unused remove function (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).\n- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).\n- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).\n- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).\n- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).\n- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: Fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).\n- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add RX splitq napi poll support (bsc#1215458).\n- idpf: add SRIOV support and other ndo_ops (bsc#1215458).\n- idpf: add TX splitq napi poll support (bsc#1215458).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and MAC filter support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for RX queues (bsc#1215458).\n- idpf: configure resources for TX queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).\n- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).\n- kabi/severities: ignore kabi in rxrpc (bsc#1210447) The rxrpc module is built since SLE15-SP3 but it is not shipped as part of any SLE product, only in Leap (in kernel-*-optional).\n- kernel-binary: suse-module-tools is also required when installed Requires(pre) adds dependency for the specific sciptlet. However, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. Add plain Requires as well.\n- kernel-source: Move provides after sources\n- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).\n- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).\n- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: Do not use SMBUS calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: Correctly initialise try compose rectangle (git-fixes).\n- media: ccs: Fix driver quirk struct documentation (git-fixes).\n- media: cedrus: Fix clock/reset sequence (git-fixes).\n- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: Fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: Add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).\n- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: Fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).\n- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).\n- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).\n- mmc: block: Retry commands in CQE error recovery (git-fixes).\n- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).\n- mmc: cqhci: Increase recovery halt timeout (git-fixes).\n- mmc: cqhci: Warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).\n- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).\n- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).\n- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).\n- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: Avoid address overwrite in kernel_connect (bsc#1216861).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: Fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nvme: update firmware version after commit (bsc#1215292).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).\n- platform/x86: wmi: Fix opening of char device (git-fixes).\n- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: Fix double shift bug (git-fixes).\n- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).\n- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: Release firmware if we have an error in probe (git-fixes).\n- r8152: Run the unload routine if we have errors during probe (git-fixes).\n- regmap: Ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).\n- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).\n- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).\n- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).\n- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: Fix ksft print formats (git-fixes).\n- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).\n- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).\n- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: Spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).\n- tty: 8250: Add support for Brainboxes UP cards (git-fixes).\n- tty: 8250: Add support for Intashield IS-100 (git-fixes).\n- tty: 8250: Add support for Intashield IX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).\n- tty: 8250: Fix port count of PX-257 (git-fixes).\n- tty: 8250: Fix up PX-803/PX-857 (git-fixes).\n- tty: 8250: Remove UC-257 and UC-431 (git-fixes).\n- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).\n- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).\n- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).\n- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).\n- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc3: Fix default mode initialization (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).\n- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).\n- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).\n- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).\n- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).\n- x86/sev: Fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).\n- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert AGF log flags to unsigned (git-fixes).\n- xfs: convert AGI log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize AG block number formatting in ftrace output (git-fixes).\n- xfs: standardize AG number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Enable RPM on controllers that support low-power states (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4731,SUSE-SLE-Micro-5.3-2023-4731,SUSE-SLE-Micro-5.4-2023-4731,SUSE-SLE-Module-Live-Patching-15-SP4-2023-4731,SUSE-SLE-Module-RT-15-SP4-2023-4731,openSUSE-Leap-Micro-5.3-2023-4731,openSUSE-Leap-Micro-5.4-2023-4731,openSUSE-SLE-15.4-2023-4731", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4731-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4731-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234731-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4731-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1189998", url: "https://bugzilla.suse.com/1189998", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216761", url: "https://bugzilla.suse.com/1216761", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:14:11Z", generator: { date: "2023-12-12T14:14:11Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4731-1", initial_release_date: "2023-12-12T14:14:11Z", revision_history: [ { date: "2023-12-12T14:14:11Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", product: { name: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", product_id: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", product: { name: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", product_id: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", product_id: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-extra-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-extra-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-livepatch-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-livepatch-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt-optional-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt-optional-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", product_id: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "kselftests-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "kselftests-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.14.21-150400.15.62.1.x86_64", product: { name: "reiserfs-kmp-rt-5.14.21-150400.15.62.1.x86_64", product_id: "reiserfs-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.3", product: { name: "SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.4", product: { name: "SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP4", product: { name: "SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp4", }, }, }, { category: "product_name", name: "SUSE Real Time Module 15 SP4", product: { name: "SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.3", product: { name: "openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.3", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.4", product: { name: "openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.62.1.noarch as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150400.15.62.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.62.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.62.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.62.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.62.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.62.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:14:11Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4784-1
Vulnerability from csaf_suse
Published
2023-12-13 12:42
Modified
2023-12-13 12:42
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
The following non-security bugs were fixed:
- USB: serial: option: add Quectel RM500U-CN modem (git-fixes).
- USB: serial: option: add Telit FE990 compositions (git-fixes).
- USB: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).
- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214408).
- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214408).
- cpu/SMT: Remove topology_smt_supported() (bsc#1214408).
- cpu/SMT: Store the current/max number of threads (bsc#1214408).
- cpu/hotplug: Create SMT sysfs interface for all arches (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- dm-raid: remove useless checking in raid_message() (git-fixes).
- l2tp: fix refcount leakage on PPPoL2TP sockets (git-fixes).
- l2tp: fix {pppol2tp, l2tp_dfs}_seq_stop() in case of seq_file overflow (git-fixes).
- md/bitmap: always wake up md_thread in timeout_store (git-fixes).
- md/bitmap: factor out a helper to set timeout (git-fixes).
- md/raid10: Do not add spare disk when recovery fails (git-fixes).
- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).
- md/raid10: clean up md_add_new_disk() (git-fixes).
- md/raid10: fix io loss while replacement replace rdev (git-fixes).
- md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes).
- md/raid10: fix memleak for 'conf->bio_split' (git-fixes).
- md/raid10: fix memleak of md thread (git-fixes).
- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).
- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).
- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).
- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).
- md/raid10: improve code of mrdev in raid10_sync_request (git-fixes).
- md/raid10: prevent soft lockup while flush writes (git-fixes).
- md/raid10: prioritize adding disk to 'removed' mirror (git-fixes).
- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).
- md: add new workqueue for delete rdev (git-fixes).
- md: avoid signed overflow in slot_store() (git-fixes).
- md: do not return existing mddevs from mddev_find_or_alloc (git-fixes).
- md: factor out a mddev_alloc_unit helper from mddev_find (git-fixes).
- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).
- md: fix deadlock causing by sysfs_notify (git-fixes).
- md: fix incorrect declaration about claim_rdev in md_import_device (git-fixes).
- md: flush md_rdev_misc_wq for HOT_ADD_DISK case (git-fixes).
- md: get sysfs entry after redundancy attr group create (git-fixes).
- md: refactor mddev_find_or_alloc (git-fixes).
- md: remove lock_bdev / unlock_bdev (git-fixes).
- mm, memcg: add mem_cgroup_disabled checks in vmpressure and swap-related functions (bsc#1190208 (MM functional and performance backports) bsc#1216759).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).
- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.
- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217607).
- s390/cmma: fix detection of DAT pages (LTC#203996 bsc#1217087).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203996 bsc#1217087).
- s390/cmma: fix initial kernel address space page table walk (LTC#203996 bsc#1217087).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217206).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217519).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217604).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203996 bsc#1217087).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203996 bsc#1217087).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217603).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1216031).
- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).
- usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail (git-fixes).
- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).
- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).
- xfs: reserve data and rt quota at the same time (bsc#1203496).
Patchnames
SUSE-2023-4784,SUSE-SLE-HA-12-SP5-2023-4784,SUSE-SLE-Live-Patching-12-SP5-2023-4784,SUSE-SLE-SDK-12-SP5-2023-4784,SUSE-SLE-SERVER-12-SP5-2023-4784,SUSE-SLE-WE-12-SP5-2023-4784
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n\nThe following non-security bugs were fixed:\n\n- USB: serial: option: add Quectel RM500U-CN modem (git-fixes).\n- USB: serial: option: add Telit FE990 compositions (git-fixes).\n- USB: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).\n- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214408).\n- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214408).\n- cpu/SMT: Remove topology_smt_supported() (bsc#1214408).\n- cpu/SMT: Store the current/max number of threads (bsc#1214408).\n- cpu/hotplug: Create SMT sysfs interface for all arches (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- dm-raid: remove useless checking in raid_message() (git-fixes).\n- l2tp: fix refcount leakage on PPPoL2TP sockets (git-fixes).\n- l2tp: fix {pppol2tp, l2tp_dfs}_seq_stop() in case of seq_file overflow (git-fixes).\n- md/bitmap: always wake up md_thread in timeout_store (git-fixes).\n- md/bitmap: factor out a helper to set timeout (git-fixes).\n- md/raid10: Do not add spare disk when recovery fails (git-fixes).\n- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).\n- md/raid10: clean up md_add_new_disk() (git-fixes).\n- md/raid10: fix io loss while replacement replace rdev (git-fixes).\n- md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes).\n- md/raid10: fix memleak for 'conf->bio_split' (git-fixes).\n- md/raid10: fix memleak of md thread (git-fixes).\n- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).\n- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).\n- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).\n- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).\n- md/raid10: improve code of mrdev in raid10_sync_request (git-fixes).\n- md/raid10: prevent soft lockup while flush writes (git-fixes).\n- md/raid10: prioritize adding disk to 'removed' mirror (git-fixes).\n- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).\n- md: add new workqueue for delete rdev (git-fixes).\n- md: avoid signed overflow in slot_store() (git-fixes).\n- md: do not return existing mddevs from mddev_find_or_alloc (git-fixes).\n- md: factor out a mddev_alloc_unit helper from mddev_find (git-fixes).\n- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).\n- md: fix deadlock causing by sysfs_notify (git-fixes).\n- md: fix incorrect declaration about claim_rdev in md_import_device (git-fixes).\n- md: flush md_rdev_misc_wq for HOT_ADD_DISK case (git-fixes).\n- md: get sysfs entry after redundancy attr group create (git-fixes).\n- md: refactor mddev_find_or_alloc (git-fixes).\n- md: remove lock_bdev / unlock_bdev (git-fixes).\n- mm, memcg: add mem_cgroup_disabled checks in vmpressure and swap-related functions (bsc#1190208 (MM functional and performance backports) bsc#1216759).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: mana: Configure hwc timeout from hardware (bsc#1214037).\n- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).\n- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.\n- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217607).\n- s390/cmma: fix detection of DAT pages (LTC#203996 bsc#1217087).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203996 bsc#1217087).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203996 bsc#1217087).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217206).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217519).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217604).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203996 bsc#1217087).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203996 bsc#1217087).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217603).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1216031).\n- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).\n- usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail (git-fixes).\n- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).\n- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).\n- xfs: reserve data and rt quota at the same time (bsc#1203496).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4784,SUSE-SLE-HA-12-SP5-2023-4784,SUSE-SLE-Live-Patching-12-SP5-2023-4784,SUSE-SLE-SDK-12-SP5-2023-4784,SUSE-SLE-SERVER-12-SP5-2023-4784,SUSE-SLE-WE-12-SP5-2023-4784", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4784-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4784-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234784-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4784-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1176950", url: "https://bugzilla.suse.com/1176950", }, { category: "self", summary: "SUSE Bug 1190208", url: "https://bugzilla.suse.com/1190208", }, { category: "self", summary: "SUSE Bug 1203496", url: "https://bugzilla.suse.com/1203496", }, { category: "self", summary: "SUSE Bug 1205462", url: "https://bugzilla.suse.com/1205462", }, { category: "self", summary: "SUSE Bug 1208787", url: "https://bugzilla.suse.com/1208787", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1214037", url: "https://bugzilla.suse.com/1214037", }, { category: "self", summary: "SUSE Bug 1214285", url: "https://bugzilla.suse.com/1214285", }, { category: "self", summary: "SUSE Bug 1214408", url: "https://bugzilla.suse.com/1214408", }, { category: "self", summary: "SUSE Bug 1214764", url: "https://bugzilla.suse.com/1214764", }, { category: "self", summary: "SUSE Bug 1216031", url: "https://bugzilla.suse.com/1216031", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217087", url: "https://bugzilla.suse.com/1217087", }, { category: "self", summary: "SUSE Bug 1217206", url: "https://bugzilla.suse.com/1217206", }, { category: "self", summary: "SUSE Bug 1217519", url: "https://bugzilla.suse.com/1217519", }, { category: "self", summary: "SUSE Bug 1217525", url: "https://bugzilla.suse.com/1217525", }, { category: "self", summary: "SUSE Bug 1217603", url: "https://bugzilla.suse.com/1217603", }, { category: "self", summary: "SUSE Bug 1217604", url: "https://bugzilla.suse.com/1217604", }, { category: "self", summary: "SUSE Bug 1217607", url: "https://bugzilla.suse.com/1217607", }, { category: "self", summary: "SUSE CVE CVE-2023-0461 page", url: "https://www.suse.com/security/cve/CVE-2023-0461/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-13T12:42:08Z", generator: { date: "2023-12-13T12:42:08Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4784-1", initial_release_date: "2023-12-13T12:42:08Z", revision_history: [ { date: "2023-12-13T12:42:08Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.186.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-122.186.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.186.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-122.186.1.aarch64", product_id: "dlm-kmp-default-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.186.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-122.186.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.186.1.aarch64", product: { name: "kernel-default-4.12.14-122.186.1.aarch64", product_id: "kernel-default-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.186.1.aarch64", product: { name: "kernel-default-base-4.12.14-122.186.1.aarch64", product_id: "kernel-default-base-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.186.1.aarch64", product: { name: "kernel-default-devel-4.12.14-122.186.1.aarch64", product_id: "kernel-default-devel-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.186.1.aarch64", product: { name: "kernel-default-extra-4.12.14-122.186.1.aarch64", product_id: "kernel-default-extra-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.186.1.aarch64", product: { name: "kernel-default-kgraft-4.12.14-122.186.1.aarch64", product_id: "kernel-default-kgraft-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.186.1.aarch64", product: { name: "kernel-default-kgraft-devel-4.12.14-122.186.1.aarch64", product_id: "kernel-default-kgraft-devel-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.186.1.aarch64", product: { name: "kernel-obs-build-4.12.14-122.186.1.aarch64", product_id: "kernel-obs-build-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.186.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-122.186.1.aarch64", product_id: "kernel-obs-qa-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.186.1.aarch64", product: { name: "kernel-syms-4.12.14-122.186.1.aarch64", product_id: "kernel-syms-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.186.1.aarch64", product: { name: "kernel-vanilla-4.12.14-122.186.1.aarch64", product_id: "kernel-vanilla-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.186.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-122.186.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.186.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-122.186.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.aarch64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.aarch64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.186.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-122.186.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-122.186.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.186.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-122.186.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-122.186.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-122.186.1.noarch", product: { name: "kernel-devel-4.12.14-122.186.1.noarch", product_id: "kernel-devel-4.12.14-122.186.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-122.186.1.noarch", product: { name: "kernel-docs-4.12.14-122.186.1.noarch", product_id: "kernel-docs-4.12.14-122.186.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-122.186.1.noarch", product: { name: "kernel-docs-html-4.12.14-122.186.1.noarch", product_id: "kernel-docs-html-4.12.14-122.186.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-122.186.1.noarch", product: { name: "kernel-macros-4.12.14-122.186.1.noarch", product_id: "kernel-macros-4.12.14-122.186.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-122.186.1.noarch", product: { name: "kernel-source-4.12.14-122.186.1.noarch", product_id: "kernel-source-4.12.14-122.186.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-122.186.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-122.186.1.noarch", product_id: "kernel-source-vanilla-4.12.14-122.186.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.186.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-122.186.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.186.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-122.186.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.186.1.ppc64le", product: { name: "kernel-debug-4.12.14-122.186.1.ppc64le", product_id: "kernel-debug-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.186.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-122.186.1.ppc64le", product_id: "kernel-debug-base-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.186.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-122.186.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-122.186.1.ppc64le", product: { name: "kernel-debug-kgraft-devel-4.12.14-122.186.1.ppc64le", product_id: "kernel-debug-kgraft-devel-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.186.1.ppc64le", product: { name: "kernel-default-4.12.14-122.186.1.ppc64le", product_id: "kernel-default-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.186.1.ppc64le", product: { name: "kernel-default-base-4.12.14-122.186.1.ppc64le", product_id: "kernel-default-base-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.186.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-122.186.1.ppc64le", product_id: "kernel-default-devel-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.186.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-122.186.1.ppc64le", product_id: "kernel-default-extra-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.186.1.ppc64le", product: { name: "kernel-default-kgraft-4.12.14-122.186.1.ppc64le", product_id: "kernel-default-kgraft-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", product: { name: "kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", product_id: "kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.186.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-122.186.1.ppc64le", product_id: "kernel-obs-build-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.186.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-122.186.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.186.1.ppc64le", product: { name: "kernel-syms-4.12.14-122.186.1.ppc64le", product_id: "kernel-syms-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.186.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-122.186.1.ppc64le", product_id: "kernel-vanilla-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.186.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-122.186.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.186.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-122.186.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.ppc64le", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.ppc64le", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", product: { name: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", product_id: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.186.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-122.186.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-122.186.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.186.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-122.186.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.186.1.s390x", product: { name: "dlm-kmp-default-4.12.14-122.186.1.s390x", product_id: "dlm-kmp-default-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.186.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-122.186.1.s390x", product_id: "gfs2-kmp-default-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.186.1.s390x", product: { name: "kernel-default-4.12.14-122.186.1.s390x", product_id: "kernel-default-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.186.1.s390x", product: { name: "kernel-default-base-4.12.14-122.186.1.s390x", product_id: "kernel-default-base-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.186.1.s390x", product: { name: "kernel-default-devel-4.12.14-122.186.1.s390x", product_id: "kernel-default-devel-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.186.1.s390x", product: { name: "kernel-default-extra-4.12.14-122.186.1.s390x", product_id: "kernel-default-extra-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.186.1.s390x", product: { name: "kernel-default-kgraft-4.12.14-122.186.1.s390x", product_id: "kernel-default-kgraft-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", product: { name: "kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", product_id: "kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-122.186.1.s390x", product: { name: "kernel-default-man-4.12.14-122.186.1.s390x", product_id: "kernel-default-man-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.186.1.s390x", product: { name: "kernel-obs-build-4.12.14-122.186.1.s390x", product_id: "kernel-obs-build-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.186.1.s390x", product: { name: "kernel-obs-qa-4.12.14-122.186.1.s390x", product_id: "kernel-obs-qa-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.186.1.s390x", product: { name: "kernel-syms-4.12.14-122.186.1.s390x", product_id: "kernel-syms-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.186.1.s390x", product: { name: "kernel-vanilla-4.12.14-122.186.1.s390x", product_id: "kernel-vanilla-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.186.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-122.186.1.s390x", product_id: "kernel-vanilla-base-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.186.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-122.186.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.s390x", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.s390x", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-122.186.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-122.186.1.s390x", product_id: "kernel-zfcpdump-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-122.186.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-122.186.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", product: { name: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", product_id: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.186.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-122.186.1.s390x", product_id: "kselftests-kmp-default-4.12.14-122.186.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.186.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-122.186.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-122.186.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.186.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-122.186.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.186.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-122.186.1.x86_64", product_id: "dlm-kmp-default-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.186.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-122.186.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.186.1.x86_64", product: { name: "kernel-debug-4.12.14-122.186.1.x86_64", product_id: "kernel-debug-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.186.1.x86_64", product: { name: "kernel-debug-base-4.12.14-122.186.1.x86_64", product_id: "kernel-debug-base-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.186.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-122.186.1.x86_64", product_id: "kernel-debug-devel-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-122.186.1.x86_64", product: { name: "kernel-debug-kgraft-devel-4.12.14-122.186.1.x86_64", product_id: "kernel-debug-kgraft-devel-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.186.1.x86_64", product: { name: "kernel-default-4.12.14-122.186.1.x86_64", product_id: "kernel-default-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.186.1.x86_64", product: { name: "kernel-default-base-4.12.14-122.186.1.x86_64", product_id: "kernel-default-base-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.186.1.x86_64", product: { name: "kernel-default-devel-4.12.14-122.186.1.x86_64", product_id: "kernel-default-devel-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.186.1.x86_64", product: { name: "kernel-default-extra-4.12.14-122.186.1.x86_64", product_id: "kernel-default-extra-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.186.1.x86_64", product: { name: "kernel-default-kgraft-4.12.14-122.186.1.x86_64", product_id: "kernel-default-kgraft-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", product: { name: "kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", product_id: "kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-122.186.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-122.186.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-122.186.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-122.186.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-122.186.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-122.186.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-kgraft-devel-4.12.14-122.186.1.x86_64", product: { name: "kernel-kvmsmall-kgraft-devel-4.12.14-122.186.1.x86_64", product_id: "kernel-kvmsmall-kgraft-devel-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.186.1.x86_64", product: { name: "kernel-obs-build-4.12.14-122.186.1.x86_64", product_id: "kernel-obs-build-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.186.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-122.186.1.x86_64", product_id: "kernel-obs-qa-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.186.1.x86_64", product: { name: "kernel-syms-4.12.14-122.186.1.x86_64", product_id: "kernel-syms-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.186.1.x86_64", product: { name: "kernel-vanilla-4.12.14-122.186.1.x86_64", product_id: "kernel-vanilla-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.186.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-122.186.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.186.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-122.186.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.x86_64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.x86_64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", product: { name: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", product_id: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.186.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-122.186.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-122.186.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.186.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-122.186.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-122.186.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP5", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP5", product: { name: "SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-kgraft-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-default-kgraft-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", }, product_reference: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-122.186.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", }, product_reference: "kernel-docs-4.12.14-122.186.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.186.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-122.186.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.186.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", }, product_reference: "kernel-default-4.12.14-122.186.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-default-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-default-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.186.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-122.186.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-base-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.186.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-122.186.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-man-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.186.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", }, product_reference: "kernel-devel-4.12.14-122.186.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.186.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", }, product_reference: "kernel-macros-4.12.14-122.186.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.186.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", }, product_reference: "kernel-source-4.12.14-122.186.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.186.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", }, product_reference: "kernel-syms-4.12.14-122.186.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", }, product_reference: "kernel-syms-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-syms-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.186.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", }, product_reference: "kernel-default-4.12.14-122.186.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-default-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-default-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.186.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-122.186.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-base-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.186.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-122.186.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", }, product_reference: "kernel-default-man-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.186.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", }, product_reference: "kernel-devel-4.12.14-122.186.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.186.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", }, product_reference: "kernel-macros-4.12.14-122.186.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.186.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", }, product_reference: "kernel-source-4.12.14-122.186.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.186.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", }, product_reference: "kernel-syms-4.12.14-122.186.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.186.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-122.186.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.186.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", }, product_reference: "kernel-syms-4.12.14-122.186.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-syms-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-122.186.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-122.186.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-0461", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0461", }, ], notes: [ { category: "general", text: "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0461", url: "https://www.suse.com/security/cve/CVE-2023-0461", }, { category: "external", summary: "SUSE Bug 1208787 for CVE-2023-0461", url: "https://bugzilla.suse.com/1208787", }, { category: "external", summary: "SUSE Bug 1208911 for CVE-2023-0461", url: "https://bugzilla.suse.com/1208911", }, { category: "external", summary: "SUSE Bug 1211833 for CVE-2023-0461", url: "https://bugzilla.suse.com/1211833", }, { category: "external", summary: "SUSE Bug 1217079 for CVE-2023-0461", url: "https://bugzilla.suse.com/1217079", }, { category: "external", summary: "SUSE Bug 1218514 for CVE-2023-0461", url: "https://bugzilla.suse.com/1218514", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:42:08Z", details: "important", }, ], title: "CVE-2023-0461", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:42:08Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:42:08Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:42:08Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:42:08Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:42:08Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.186.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.186.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.186.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:42:08Z", details: "important", }, ], title: "CVE-2023-5717", }, ], }
suse-su-2023:4735-1
Vulnerability from csaf_suse
Published
2023-12-12 14:16
Modified
2023-12-12 14:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
The following non-security bugs were fixed:
- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214408).
- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214408).
- cpu/SMT: Remove topology_smt_supported() (bsc#1214408).
- cpu/SMT: Store the current/max number of threads (bsc#1214408).
- cpu/hotplug: Create SMT sysfs interface for all arches (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- dm-raid: remove useless checking in raid_message() (git-fixes).
- l2tp: fix refcount leakage on PPPoL2TP sockets (git-fixes).
- l2tp: fix {pppol2tp, l2tp_dfs}_seq_stop() in case of seq_file overflow (git-fixes).
- md/bitmap: always wake up md_thread in timeout_store (git-fixes).
- md/bitmap: factor out a helper to set timeout (git-fixes).
- md/raid10: Do not add spare disk when recovery fails (git-fixes).
- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).
- md/raid10: clean up md_add_new_disk() (git-fixes).
- md/raid10: fix io loss while replacement replace rdev (git-fixes).
- md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes).
- md/raid10: fix memleak for 'conf->bio_split' (git-fixes).
- md/raid10: fix memleak of md thread (git-fixes).
- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).
- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).
- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).
- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).
- md/raid10: improve code of mrdev in raid10_sync_request (git-fixes).
- md/raid10: prevent soft lockup while flush writes (git-fixes).
- md/raid10: prioritize adding disk to 'removed' mirror (git-fixes).
- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).
- md: add new workqueue for delete rdev (git-fixes).
- md: avoid signed overflow in slot_store() (git-fixes).
- md: do not return existing mddevs from mddev_find_or_alloc (git-fixes).
- md: factor out a mddev_alloc_unit helper from mddev_find (git-fixes).
- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).
- md: fix deadlock causing by sysfs_notify (git-fixes).
- md: fix incorrect declaration about claim_rdev in md_import_device (git-fixes).
- md: flush md_rdev_misc_wq for HOT_ADD_DISK case (git-fixes).
- md: get sysfs entry after redundancy attr group create (git-fixes).
- md: refactor mddev_find_or_alloc (git-fixes).
- md: remove lock_bdev / unlock_bdev (git-fixes).
- mm, memcg: add mem_cgroup_disabled checks in vmpressure and swap-related functions (bsc#1190208 (MM functional and performance backports) bsc#1216759).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).
- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.
- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217607).
- s390/cmma: fix detection of DAT pages (LTC#203996 bsc#1217087).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203996 bsc#1217087).
- s390/cmma: fix initial kernel address space page table walk (LTC#203996 bsc#1217087).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217206).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217519).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217604).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203996 bsc#1217087).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203996 bsc#1217087).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217603).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1216031).
- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).
- usb: serial: option: add Quectel RM500U-CN modem (git-fixes).
- usb: serial: option: add Telit FE990 compositions (git-fixes).
- usb: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).
- usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail (git-fixes).
- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).
- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).
- xfs: reserve data and rt quota at the same time (bsc#1203496).
Patchnames
SUSE-2023-4735,SUSE-SLE-RT-12-SP5-2023-4735
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n\nThe following non-security bugs were fixed:\n\n- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214408).\n- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214408).\n- cpu/SMT: Remove topology_smt_supported() (bsc#1214408).\n- cpu/SMT: Store the current/max number of threads (bsc#1214408).\n- cpu/hotplug: Create SMT sysfs interface for all arches (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- dm-raid: remove useless checking in raid_message() (git-fixes).\n- l2tp: fix refcount leakage on PPPoL2TP sockets (git-fixes).\n- l2tp: fix {pppol2tp, l2tp_dfs}_seq_stop() in case of seq_file overflow (git-fixes).\n- md/bitmap: always wake up md_thread in timeout_store (git-fixes).\n- md/bitmap: factor out a helper to set timeout (git-fixes).\n- md/raid10: Do not add spare disk when recovery fails (git-fixes).\n- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).\n- md/raid10: clean up md_add_new_disk() (git-fixes).\n- md/raid10: fix io loss while replacement replace rdev (git-fixes).\n- md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes).\n- md/raid10: fix memleak for 'conf->bio_split' (git-fixes).\n- md/raid10: fix memleak of md thread (git-fixes).\n- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).\n- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).\n- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).\n- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).\n- md/raid10: improve code of mrdev in raid10_sync_request (git-fixes).\n- md/raid10: prevent soft lockup while flush writes (git-fixes).\n- md/raid10: prioritize adding disk to 'removed' mirror (git-fixes).\n- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).\n- md: add new workqueue for delete rdev (git-fixes).\n- md: avoid signed overflow in slot_store() (git-fixes).\n- md: do not return existing mddevs from mddev_find_or_alloc (git-fixes).\n- md: factor out a mddev_alloc_unit helper from mddev_find (git-fixes).\n- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).\n- md: fix deadlock causing by sysfs_notify (git-fixes).\n- md: fix incorrect declaration about claim_rdev in md_import_device (git-fixes).\n- md: flush md_rdev_misc_wq for HOT_ADD_DISK case (git-fixes).\n- md: get sysfs entry after redundancy attr group create (git-fixes).\n- md: refactor mddev_find_or_alloc (git-fixes).\n- md: remove lock_bdev / unlock_bdev (git-fixes).\n- mm, memcg: add mem_cgroup_disabled checks in vmpressure and swap-related functions (bsc#1190208 (MM functional and performance backports) bsc#1216759).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: mana: Configure hwc timeout from hardware (bsc#1214037).\n- net: mana: Fix MANA VF unload when hardware is unresponsive (bsc#1214764).\n- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).\n- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.\n- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217607).\n- s390/cmma: fix detection of DAT pages (LTC#203996 bsc#1217087).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203996 bsc#1217087).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203996 bsc#1217087).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217206).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217519).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217604).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203996 bsc#1217087).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203996 bsc#1217087).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217603).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1216031).\n- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).\n- usb: serial: option: add Quectel RM500U-CN modem (git-fixes).\n- usb: serial: option: add Telit FE990 compositions (git-fixes).\n- usb: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).\n- usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail (git-fixes).\n- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).\n- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).\n- xfs: reserve data and rt quota at the same time (bsc#1203496).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4735,SUSE-SLE-RT-12-SP5-2023-4735", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4735-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4735-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234735-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4735-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1176950", url: "https://bugzilla.suse.com/1176950", }, { category: "self", summary: "SUSE Bug 1190208", url: "https://bugzilla.suse.com/1190208", }, { category: "self", summary: "SUSE Bug 1203496", url: "https://bugzilla.suse.com/1203496", }, { category: "self", summary: "SUSE Bug 1205462", url: "https://bugzilla.suse.com/1205462", }, { category: "self", summary: "SUSE Bug 1208787", url: "https://bugzilla.suse.com/1208787", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1214037", url: "https://bugzilla.suse.com/1214037", }, { category: "self", summary: "SUSE Bug 1214285", url: "https://bugzilla.suse.com/1214285", }, { category: "self", summary: "SUSE Bug 1214408", url: "https://bugzilla.suse.com/1214408", }, { category: "self", summary: "SUSE Bug 1214764", url: "https://bugzilla.suse.com/1214764", }, { category: "self", summary: "SUSE Bug 1216031", url: "https://bugzilla.suse.com/1216031", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217087", url: "https://bugzilla.suse.com/1217087", }, { category: "self", summary: "SUSE Bug 1217206", url: "https://bugzilla.suse.com/1217206", }, { category: "self", summary: "SUSE Bug 1217519", url: "https://bugzilla.suse.com/1217519", }, { category: "self", summary: "SUSE Bug 1217525", url: "https://bugzilla.suse.com/1217525", }, { category: "self", summary: "SUSE Bug 1217603", url: "https://bugzilla.suse.com/1217603", }, { category: "self", summary: "SUSE Bug 1217604", url: "https://bugzilla.suse.com/1217604", }, { category: "self", summary: "SUSE Bug 1217607", url: "https://bugzilla.suse.com/1217607", }, { category: "self", summary: "SUSE CVE CVE-2023-0461 page", url: "https://www.suse.com/security/cve/CVE-2023-0461/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-12T14:16:28Z", generator: { date: "2023-12-12T14:16:28Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4735-1", initial_release_date: "2023-12-12T14:16:28Z", revision_history: [ { date: "2023-12-12T14:16:28Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-4.12.14-10.154.1.noarch", product: { name: "kernel-devel-rt-4.12.14-10.154.1.noarch", product_id: "kernel-devel-rt-4.12.14-10.154.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-4.12.14-10.154.1.noarch", product: { name: "kernel-source-rt-4.12.14-10.154.1.noarch", product_id: "kernel-source-rt-4.12.14-10.154.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", product: { name: "cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", product_id: "cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-4.12.14-10.154.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-4.12.14-10.154.1.x86_64", product_id: "cluster-md-kmp-rt_debug-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-4.12.14-10.154.1.x86_64", product: { name: "dlm-kmp-rt-4.12.14-10.154.1.x86_64", product_id: "dlm-kmp-rt-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-4.12.14-10.154.1.x86_64", product: { name: "dlm-kmp-rt_debug-4.12.14-10.154.1.x86_64", product_id: "dlm-kmp-rt_debug-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-4.12.14-10.154.1.x86_64", product: { name: "gfs2-kmp-rt-4.12.14-10.154.1.x86_64", product_id: "gfs2-kmp-rt-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-4.12.14-10.154.1.x86_64", product: { name: "gfs2-kmp-rt_debug-4.12.14-10.154.1.x86_64", product_id: "gfs2-kmp-rt_debug-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt-4.12.14-10.154.1.x86_64", product_id: "kernel-rt-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt-base-4.12.14-10.154.1.x86_64", product_id: "kernel-rt-base-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt-devel-4.12.14-10.154.1.x86_64", product_id: "kernel-rt-devel-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt-extra-4.12.14-10.154.1.x86_64", product_id: "kernel-rt-extra-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-kgraft-devel-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt-kgraft-devel-4.12.14-10.154.1.x86_64", product_id: "kernel-rt-kgraft-devel-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt_debug-4.12.14-10.154.1.x86_64", product_id: "kernel-rt_debug-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-base-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt_debug-base-4.12.14-10.154.1.x86_64", product_id: "kernel-rt_debug-base-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", product_id: "kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt_debug-extra-4.12.14-10.154.1.x86_64", product_id: "kernel-rt_debug-extra-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-kgraft-devel-4.12.14-10.154.1.x86_64", product: { name: "kernel-rt_debug-kgraft-devel-4.12.14-10.154.1.x86_64", product_id: "kernel-rt_debug-kgraft-devel-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-4.12.14-10.154.1.x86_64", product: { name: "kernel-syms-rt-4.12.14-10.154.1.x86_64", product_id: "kernel-syms-rt-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-4.12.14-10.154.1.x86_64", product: { name: "kselftests-kmp-rt-4.12.14-10.154.1.x86_64", product_id: "kselftests-kmp-rt-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-4.12.14-10.154.1.x86_64", product: { name: "kselftests-kmp-rt_debug-4.12.14-10.154.1.x86_64", product_id: "kselftests-kmp-rt_debug-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", product: { name: "ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", product_id: "ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-4.12.14-10.154.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-4.12.14-10.154.1.x86_64", product_id: "ocfs2-kmp-rt_debug-4.12.14-10.154.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 12 SP5", product: { name: "SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", }, product_reference: "cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", }, product_reference: "dlm-kmp-rt-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", }, product_reference: "gfs2-kmp-rt-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-4.12.14-10.154.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", }, product_reference: "kernel-devel-rt-4.12.14-10.154.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", }, product_reference: "kernel-rt-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", }, product_reference: "kernel-rt-base-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", }, product_reference: "kernel-rt-devel-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", }, product_reference: "kernel-rt_debug-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", }, product_reference: "kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-4.12.14-10.154.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", }, product_reference: "kernel-source-rt-4.12.14-10.154.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", }, product_reference: "kernel-syms-rt-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-4.12.14-10.154.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", }, product_reference: "ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-0461", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0461", }, ], notes: [ { category: "general", text: "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0461", url: "https://www.suse.com/security/cve/CVE-2023-0461", }, { category: "external", summary: "SUSE Bug 1208787 for CVE-2023-0461", url: "https://bugzilla.suse.com/1208787", }, { category: "external", summary: "SUSE Bug 1208911 for CVE-2023-0461", url: "https://bugzilla.suse.com/1208911", }, { category: "external", summary: "SUSE Bug 1211833 for CVE-2023-0461", url: "https://bugzilla.suse.com/1211833", }, { category: "external", summary: "SUSE Bug 1217079 for CVE-2023-0461", url: "https://bugzilla.suse.com/1217079", }, { category: "external", summary: "SUSE Bug 1218514 for CVE-2023-0461", url: "https://bugzilla.suse.com/1218514", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:16:28Z", details: "important", }, ], title: "CVE-2023-0461", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:16:28Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:16:28Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:16:28Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:16:28Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:16:28Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.154.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.154.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.154.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-12T14:16:28Z", details: "important", }, ], title: "CVE-2023-5717", }, ], }
suse-su-2023:4782-1
Vulnerability from csaf_suse
Published
2023-12-13 12:39
Modified
2023-12-13 12:39
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
The following non-security bugs were fixed:
- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).
- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).
- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).
- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).
- alsa: hda/realtek: add quirks for hp laptops (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).
- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).
- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).
- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).
- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).
- alsa: info: fix potential deadlock at disconnection (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: add cortex-a520 cpu part definition (git-fixes)
- arm64: allow kprobes on el0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass esr_elx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out el1 ssbs emulation hook (git-fixes)
- arm64: report el1 undefs better (git-fixes)
- arm64: rework bti exception handling (git-fixes)
- arm64: rework el0 mrs emulation (git-fixes)
- arm64: rework fpac exception handling (git-fixes)
- arm64: split el0/el1 undef handlers (git-fixes)
- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- asoc: ams-delta.c: use component after check (git-fixes).
- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).
- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).
- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).
- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).
- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).
- asoc: rt5650: fix the wrong result of key button (git-fixes).
- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).
- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).
- atl1c: work around the dma rx overflow issue (git-fixes).
- atm: iphase: do pci error checks on own line (git-fixes).
- blk-mq: do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: add device 0bda:887b to device tables (git-fixes).
- bluetooth: add device 13d3:3571 to device tables (git-fixes).
- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).
- bluetooth: btusb: add date->evt_skb is null check (git-fixes).
- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).
- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).
- can: isotp: set max pdu size to 64 kbyte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: fix comment (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).
- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).
- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).
- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).
- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).
- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).
- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).
- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).
- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.
- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use c syntax highlight in driver.rst (bsc#1215458).
- documentation: networking: correct possessive 'its' (bsc#1215458).
- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).
- drm/amd/display: avoid null dereference of timing generator (git-fixes).
- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).
- drm/amdgpu: do not use atrm for external devices (git-fixes).
- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).
- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: fix bit updates (git-fixes).
- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).
- drm/gud: use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).
- drm/i915: fix potential spectre vulnerability (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).
- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: create devm device attachment (git-fixes).
- drm/mipi-dsi: create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).
- drm/panel: st7703: pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).
- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: omapfb: drop unused remove function (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- fix termination state for idr_for_each_entry_ul() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).
- hid: cp2112: fix duplicate workqueue initialization (git-fixes).
- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).
- hid: hyperv: remove unused struct synthhid_msg (git-fixes).
- hid: hyperv: replace one-element array with flexible-array member (git-fixes).
- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).
- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).
- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).
- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).
- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).
- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).
- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).
- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).
- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).
- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and mac filter support (bsc#1215458).
- idpf: add rx splitq napi poll support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: add sriov support and other ndo_ops (bsc#1215458).
- idpf: add tx splitq napi poll support (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for rx queues (bsc#1215458).
- idpf: configure resources for tx queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).
- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).
- input: xpad - add vid for turtle beach controllers (git-fixes).
- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.
- kernel-source: move provides after sources
- leds: pwm: do not disable the pwm when the led should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: do not use smbus calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: correctly initialise try compose rectangle (git-fixes).
- media: ccs: fix driver quirk struct documentation (git-fixes).
- media: cedrus: fix clock/reset sequence (git-fixes).
- media: cobalt: use field_get() to extract link width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).
- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: fix double put in dln2_probe (git-fixes).
- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).
- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).
- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).
- mmc: block: retry commands in cqe error recovery (git-fixes).
- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).
- mmc: cqhci: increase recovery halt timeout (git-fixes).
- mmc: cqhci: warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).
- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).
- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).
- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee module_device_table built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).
- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).
- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: avoid address overwrite in kernel_connect (bsc#1216861).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).
- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).
- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).
- pci: extract ats disabling to a helper function (bsc#1215458).
- pci: exynos: do not discard .remove() callback (git-fixes).
- pci: keystone: do not discard .probe() callback (git-fixes).
- pci: keystone: do not discard .remove() callback (git-fixes).
- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).
- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).
- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).
- pci: use field_get() to extract link width (git-fixes).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).
- platform/x86: wmi: fix opening of char device (git-fixes).
- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).
- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).
- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).
- pwm: fix double shift bug (git-fixes).
- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).
- r8152: release firmware if we have an error in probe (git-fixes).
- r8152: run the unload routine if we have errors during probe (git-fixes).
- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).
- regmap: ensure range selector registers are updated after cache sync (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).
- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).
- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.
- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.
- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage
- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).
- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).
- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).
- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).
- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).
- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).
- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: fix ksft print formats (git-fixes).
- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).
- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).
- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).
- tty: 8250: add support for additional brainboxes px cards (git-fixes).
- tty: 8250: add support for additional brainboxes uc cards (git-fixes).
- tty: 8250: add support for brainboxes up cards (git-fixes).
- tty: 8250: add support for intashield is-100 (git-fixes).
- tty: 8250: add support for intashield ix cards (git-fixes).
- tty: 8250: fix port count of px-257 (git-fixes).
- tty: 8250: fix up px-803/px-857 (git-fixes).
- tty: 8250: remove uc-257 and uc-431 (git-fixes).
- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).
- usb: chipidea: fix dma overwrite for tegra (git-fixes).
- usb: chipidea: simplify tegra dma alignment code (git-fixes).
- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc2: write hcint with intmask applied (bsc#1214286).
- usb: dwc3: fix default mode initialization (git-fixes).
- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).
- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: serial: option: add fibocom l7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).
- usb: serial: option: fix fm101r-gl defines (git-fixes).
- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).
- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).
- usb: usbip: fix stub_dev hub disconnect (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).
- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).
- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).
- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).
- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).
- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: make hv_get_nmi_reason public (git-fixes).
- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).
- x86/sev: fix calculation of end address based on number of pages (git-fixes).
- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).
- x86: move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert agf log flags to unsigned (git-fixes).
- xfs: convert agi log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize ag block number formatting in ftrace output (git-fixes).
- xfs: standardize ag number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: enable rpm on controllers that support low-power states (git-fixes).
- xhci: loosen rpm as default policy to cover for amd xhc 1.1 (git-fixes).
Patchnames
SUSE-2023-4782,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4782,openSUSE-SLE-15.4-2023-4782
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n\nThe following non-security bugs were fixed:\n\n- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).\n- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).\n- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).\n- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).\n- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).\n- alsa: hda/realtek: add quirks for hp laptops (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).\n- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).\n- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).\n- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).\n- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).\n- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).\n- alsa: info: fix potential deadlock at disconnection (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: add cortex-a520 cpu part definition (git-fixes)\n- arm64: allow kprobes on el0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass esr_elx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out el1 ssbs emulation hook (git-fixes)\n- arm64: report el1 undefs better (git-fixes)\n- arm64: rework bti exception handling (git-fixes)\n- arm64: rework el0 mrs emulation (git-fixes)\n- arm64: rework fpac exception handling (git-fixes)\n- arm64: split el0/el1 undef handlers (git-fixes)\n- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- asoc: ams-delta.c: use component after check (git-fixes).\n- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).\n- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).\n- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).\n- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).\n- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).\n- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).\n- asoc: rt5650: fix the wrong result of key button (git-fixes).\n- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).\n- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: work around the dma rx overflow issue (git-fixes).\n- atm: iphase: do pci error checks on own line (git-fixes).\n- blk-mq: do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: add device 0bda:887b to device tables (git-fixes).\n- bluetooth: add device 13d3:3571 to device tables (git-fixes).\n- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).\n- bluetooth: btusb: add date->evt_skb is null check (git-fixes).\n- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).\n- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).\n- can: isotp: set max pdu size to 64 kbyte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: fix comment (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).\n- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).\n- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).\n- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).\n- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).\n- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).\n- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).\n- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.\n- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use c syntax highlight in driver.rst (bsc#1215458).\n- documentation: networking: correct possessive 'its' (bsc#1215458).\n- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).\n- drm/amd/display: avoid null dereference of timing generator (git-fixes).\n- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).\n- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).\n- drm/amdgpu: do not use atrm for external devices (git-fixes).\n- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).\n- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: fix bit updates (git-fixes).\n- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).\n- drm/gud: use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).\n- drm/i915: fix potential spectre vulnerability (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).\n- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: create devm device attachment (git-fixes).\n- drm/mipi-dsi: create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).\n- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).\n- drm/panel: st7703: pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).\n- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: omapfb: drop unused remove function (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- fix termination state for idr_for_each_entry_ul() (git-fixes).\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).\n- hid: cp2112: fix duplicate workqueue initialization (git-fixes).\n- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- hid: hyperv: remove unused struct synthhid_msg (git-fixes).\n- hid: hyperv: replace one-element array with flexible-array member (git-fixes).\n- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).\n- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).\n- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).\n- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).\n- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).\n- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).\n- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).\n- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).\n- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).\n- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and mac filter support (bsc#1215458).\n- idpf: add rx splitq napi poll support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: add sriov support and other ndo_ops (bsc#1215458).\n- idpf: add tx splitq napi poll support (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for rx queues (bsc#1215458).\n- idpf: configure resources for tx queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).\n- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).\n- input: xpad - add vid for turtle beach controllers (git-fixes).\n- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).\n- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).\n- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.\n- kernel-source: move provides after sources\n- leds: pwm: do not disable the pwm when the led should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: do not use smbus calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: correctly initialise try compose rectangle (git-fixes).\n- media: ccs: fix driver quirk struct documentation (git-fixes).\n- media: cedrus: fix clock/reset sequence (git-fixes).\n- media: cobalt: use field_get() to extract link width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).\n- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).\n- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).\n- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).\n- mmc: block: retry commands in cqe error recovery (git-fixes).\n- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).\n- mmc: cqhci: increase recovery halt timeout (git-fixes).\n- mmc: cqhci: warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).\n- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).\n- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).\n- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee module_device_table built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).\n- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).\n- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: avoid address overwrite in kernel_connect (bsc#1216861).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nvme: update firmware version after commit (bsc#1215292).\n- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).\n- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).\n- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).\n- pci: extract ats disabling to a helper function (bsc#1215458).\n- pci: exynos: do not discard .remove() callback (git-fixes).\n- pci: keystone: do not discard .probe() callback (git-fixes).\n- pci: keystone: do not discard .remove() callback (git-fixes).\n- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).\n- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).\n- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).\n- pci: use field_get() to extract link width (git-fixes).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).\n- platform/x86: wmi: fix opening of char device (git-fixes).\n- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).\n- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).\n- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).\n- pwm: fix double shift bug (git-fixes).\n- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: release firmware if we have an error in probe (git-fixes).\n- r8152: run the unload routine if we have errors during probe (git-fixes).\n- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).\n- regmap: ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).\n- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).\n- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.\n- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.\n- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage\n- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).\n- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).\n- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).\n- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).\n- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).\n- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).\n- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: fix ksft print formats (git-fixes).\n- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).\n- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).\n- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).\n- tty: 8250: add support for additional brainboxes px cards (git-fixes).\n- tty: 8250: add support for additional brainboxes uc cards (git-fixes).\n- tty: 8250: add support for brainboxes up cards (git-fixes).\n- tty: 8250: add support for intashield is-100 (git-fixes).\n- tty: 8250: add support for intashield ix cards (git-fixes).\n- tty: 8250: fix port count of px-257 (git-fixes).\n- tty: 8250: fix up px-803/px-857 (git-fixes).\n- tty: 8250: remove uc-257 and uc-431 (git-fixes).\n- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).\n- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).\n- usb: chipidea: fix dma overwrite for tegra (git-fixes).\n- usb: chipidea: simplify tegra dma alignment code (git-fixes).\n- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc2: write hcint with intmask applied (bsc#1214286).\n- usb: dwc3: fix default mode initialization (git-fixes).\n- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).\n- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: serial: option: add fibocom l7xx modules (git-fixes).\n- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).\n- usb: serial: option: fix fm101r-gl defines (git-fixes).\n- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).\n- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).\n- usb: usbip: fix stub_dev hub disconnect (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).\n- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).\n- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).\n- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).\n- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: make hv_get_nmi_reason public (git-fixes).\n- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).\n- x86/sev: fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).\n- x86: move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert agf log flags to unsigned (git-fixes).\n- xfs: convert agi log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize ag block number formatting in ftrace output (git-fixes).\n- xfs: standardize ag number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: enable rpm on controllers that support low-power states (git-fixes).\n- xhci: loosen rpm as default policy to cover for amd xhc 1.1 (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4782,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4782,openSUSE-SLE-15.4-2023-4782", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4782-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4782-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234782-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4782-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-13T12:39:46Z", generator: { date: "2023-12-13T12:39:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4782-1", initial_release_date: "2023-12-13T12:39:46Z", revision_history: [ { date: "2023-12-13T12:39:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", product_id: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", product: { name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", product_id: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", product: { name: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", product_id: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", product: { name: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", product_id: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", product_id: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", product: { name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", product_id: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.75.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.75.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150400.14.75.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150400.14.75.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150400.14.75.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150400.14.75.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.75.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.75.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.75.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T12:39:46Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2023:4810-1
Vulnerability from csaf_suse
Published
2023-12-13 17:59
Modified
2023-12-13 17:59
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
The following non-security bugs were fixed:
- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).
- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).
- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).
- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).
- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).
- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).
- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).
- ALSA: info: Fix potential deadlock at disconnection (git-fixes).
- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).
- ASoC: ams-delta.c: use component after check (git-fixes).
- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).
- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).
- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).
- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).
- ASoC: rt5650: fix the wrong result of key button (git-fixes).
- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).
- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).
- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).
- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).
- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).
- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).
- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).
- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).
- HID: hyperv: remove unused struct synthhid_msg (git-fixes).
- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).
- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).
- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).
- Input: xpad - add VID for Turtle Beach controllers (git-fixes).
- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).
- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).
- PCI: Extract ATS disabling to a helper function (bsc#1215458).
- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).
- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).
- PCI: Use FIELD_GET() to extract Link Width (git-fixes).
- PCI: exynos: Do not discard .remove() callback (git-fixes).
- PCI: keystone: Do not discard .probe() callback (git-fixes).
- PCI: keystone: Do not discard .remove() callback (git-fixes).
- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).
- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).
- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).
- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).
- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).
- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- USB: serial: option: add Fibocom L7xx modules (git-fixes).
- USB: serial: option: add Luat Air72*U series products (git-fixes).
- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- USB: usbip: fix stub_dev hub disconnect (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: Add Cortex-A520 CPU part definition (git-fixes)
- arm64: allow kprobes on EL0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass ESR_ELx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out EL1 SSBS emulation hook (git-fixes)
- arm64: report EL1 UNDEFs better (git-fixes)
- arm64: rework BTI exception handling (git-fixes)
- arm64: rework EL0 MRS emulation (git-fixes)
- arm64: rework FPAC exception handling (git-fixes)
- arm64: split EL0/EL1 UNDEF handlers (git-fixes)
- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).
- atl1c: Work around the DMA RX overflow issue (git-fixes).
- atm: iphase: Do PCI error checks on own line (git-fixes).
- blk-mq: Do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: Add device 0bda:887b to device tables (git-fixes).
- bluetooth: Add device 13d3:3571 to device tables (git-fixes).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).
- can: isotp: set max PDU size to 64 kByte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: Fix comment (git-fixes).
- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).
- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).
- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).
- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: Fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).
- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).
- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).
- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).
- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use C syntax highlight in driver.rst (bsc#1215458).
- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).
- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).
- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: do not use ATRM for external devices (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).
- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: Fix bit updates (git-fixes).
- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).
- drm/gud: Use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).
- drm/i915: Fix potential spectre vulnerability (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).
- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: Create devm device attachment (git-fixes).
- drm/mipi-dsi: Create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).
- drm/panel: st7703: Pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).
- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: omapfb: Drop unused remove function (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).
- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).
- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).
- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).
- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).
- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: Fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).
- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).
- idpf: add RX splitq napi poll support (bsc#1215458).
- idpf: add SRIOV support and other ndo_ops (bsc#1215458).
- idpf: add TX splitq napi poll support (bsc#1215458).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and MAC filter support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for RX queues (bsc#1215458).
- idpf: configure resources for TX queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).
- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).
- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: Do not use SMBUS calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).
- media: ccs: Correctly initialise try compose rectangle (git-fixes).
- media: ccs: Fix driver quirk struct documentation (git-fixes).
- media: cedrus: Fix clock/reset sequence (git-fixes).
- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: Fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: Add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).
- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: Fix double put in dln2_probe (git-fixes).
- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).
- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).
- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).
- mmc: block: Retry commands in CQE error recovery (git-fixes).
- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).
- mmc: cqhci: Increase recovery halt timeout (git-fixes).
- mmc: cqhci: Warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).
- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).
- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).
- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: Avoid address overwrite in kernel_connect (bsc#1216861).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: Fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).
- platform/x86: wmi: Fix opening of char device (git-fixes).
- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: Fix double shift bug (git-fixes).
- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).
- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).
- r8152: Release firmware if we have an error in probe (git-fixes).
- r8152: Run the unload routine if we have errors during probe (git-fixes).
- regmap: Ensure range selector registers are updated after cache sync (git-fixes).
- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).
- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).
- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).
- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).
- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: Fix ksft print formats (git-fixes).
- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).
- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).
- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: Spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).
- tty: 8250: Add support for Brainboxes UP cards (git-fixes).
- tty: 8250: Add support for Intashield IS-100 (git-fixes).
- tty: 8250: Add support for Intashield IX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).
- tty: 8250: Fix port count of PX-257 (git-fixes).
- tty: 8250: Fix up PX-803/PX-857 (git-fixes).
- tty: 8250: Remove UC-257 and UC-431 (git-fixes).
- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).
- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).
- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc3: Fix default mode initialization (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).
- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).
- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).
- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).
- x86/sev: Fix calculation of end address based on number of pages (git-fixes).
- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert AGF log flags to unsigned (git-fixes).
- xfs: convert AGI log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize AG block number formatting in ftrace output (git-fixes).
- xfs: standardize AG number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Enable RPM on controllers that support low-power states (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
Patchnames
SUSE-2023-4810,SUSE-SLE-Micro-5.3-2023-4810,SUSE-SLE-Micro-5.4-2023-4810,SUSE-SLE-Module-Basesystem-15-SP4-2023-4810,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4810,SUSE-SLE-Module-Legacy-15-SP4-2023-4810,SUSE-SLE-Module-Live-Patching-15-SP4-2023-4810,SUSE-SLE-Product-HA-15-SP4-2023-4810,SUSE-SLE-Product-WE-15-SP4-2023-4810,openSUSE-Leap-Micro-5.3-2023-4810,openSUSE-Leap-Micro-5.4-2023-4810,openSUSE-SLE-15.4-2023-4810
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).\n- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).\n- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).\n- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).\n- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).\n- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).\n\nThe following non-security bugs were fixed:\n\n- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).\n- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).\n- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).\n- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).\n- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).\n- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).\n- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).\n- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).\n- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).\n- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).\n- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).\n- ALSA: info: Fix potential deadlock at disconnection (git-fixes).\n- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).\n- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).\n- ASoC: ams-delta.c: use component after check (git-fixes).\n- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).\n- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).\n- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).\n- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).\n- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).\n- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).\n- ASoC: rt5650: fix the wrong result of key button (git-fixes).\n- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).\n- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).\n- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).\n- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).\n- Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).\n- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).\n- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).\n- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).\n- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).\n- HID: hyperv: remove unused struct synthhid_msg (git-fixes).\n- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).\n- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).\n- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).\n- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).\n- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).\n- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).\n- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).\n- Input: xpad - add VID for Turtle Beach controllers (git-fixes).\n- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).\n- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).\n- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).\n- PCI: Extract ATS disabling to a helper function (bsc#1215458).\n- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).\n- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).\n- PCI: Use FIELD_GET() to extract Link Width (git-fixes).\n- PCI: exynos: Do not discard .remove() callback (git-fixes).\n- PCI: keystone: Do not discard .probe() callback (git-fixes).\n- PCI: keystone: Do not discard .remove() callback (git-fixes).\n- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).\n- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).\n- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).\n- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).\n- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).\n- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).\n- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).\n- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).\n- USB: serial: option: add Fibocom L7xx modules (git-fixes).\n- USB: serial: option: add Luat Air72*U series products (git-fixes).\n- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).\n- USB: serial: option: fix FM101R-GL defines (git-fixes).\n- USB: usbip: fix stub_dev hub disconnect (git-fixes).\n- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).\n- arm64: Add Cortex-A520 CPU part definition (git-fixes)\n- arm64: allow kprobes on EL0 handlers (git-fixes)\n- arm64: armv8_deprecated move emulation functions (git-fixes)\n- arm64: armv8_deprecated: fix unused-function error (git-fixes)\n- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)\n- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)\n- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)\n- arm64: consistently pass ESR_ELx to die() (git-fixes)\n- arm64: die(): pass 'err' as long (git-fixes)\n- arm64: factor insn read out of call_undef_hook() (git-fixes)\n- arm64: factor out EL1 SSBS emulation hook (git-fixes)\n- arm64: report EL1 UNDEFs better (git-fixes)\n- arm64: rework BTI exception handling (git-fixes)\n- arm64: rework EL0 MRS emulation (git-fixes)\n- arm64: rework FPAC exception handling (git-fixes)\n- arm64: split EL0/EL1 UNDEF handlers (git-fixes)\n- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).\n- atl1c: Work around the DMA RX overflow issue (git-fixes).\n- atm: iphase: Do PCI error checks on own line (git-fixes).\n- blk-mq: Do not clear driver tags own mapping (bsc#1217366).\n- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).\n- bluetooth: Add device 0bda:887b to device tables (git-fixes).\n- bluetooth: Add device 13d3:3571 to device tables (git-fixes).\n- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).\n- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).\n- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).\n- can: isotp: add local echo tx processing for consecutive frames (git-fixes).\n- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).\n- can: isotp: fix tx state handling for echo tx processing (git-fixes).\n- can: isotp: handle wait_event_interruptible() return values (git-fixes).\n- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).\n- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).\n- can: isotp: remove re-binding of bound socket (git-fixes).\n- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).\n- can: isotp: set max PDU size to 64 kByte (git-fixes).\n- can: isotp: split tx timer into transmission and timeout (git-fixes).\n- can: sja1000: Fix comment (git-fixes).\n- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).\n- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).\n- clk: imx: imx8mq: correct error handling path (git-fixes).\n- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).\n- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).\n- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).\n- clk: npcm7xx: Fix incorrect kfree (git-fixes).\n- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).\n- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).\n- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).\n- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).\n- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).\n- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).\n- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).\n- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).\n- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).\n- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).\n- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).\n- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).\n- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).\n- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).\n- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).\n- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).\n- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).\n- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).\n- docs: net: reformat driver.rst from a list to sections (bsc#1215458).\n- docs: net: use C syntax highlight in driver.rst (bsc#1215458).\n- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).\n- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).\n- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).\n- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).\n- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).\n- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).\n- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).\n- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).\n- drm/amdgpu: do not use ATRM for external devices (git-fixes).\n- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).\n- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).\n- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).\n- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).\n- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).\n- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).\n- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).\n- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).\n- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).\n- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).\n- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).\n- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).\n- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).\n- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).\n- drm/bridge: tc358768: Fix bit updates (git-fixes).\n- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).\n- drm/gud: Use size_add() in call to struct_size() (git-fixes).\n- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).\n- drm/i915: Fix potential spectre vulnerability (git-fixes).\n- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).\n- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).\n- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).\n- drm/mipi-dsi: Create devm device attachment (git-fixes).\n- drm/mipi-dsi: Create devm device registration (git-fixes).\n- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).\n- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).\n- drm/panel: fix a possible null pointer dereference (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).\n- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).\n- drm/panel: st7703: Pick different reset sequence (git-fixes).\n- drm/qxl: prevent memory leak (git-fixes).\n- drm/radeon: possible buffer overflow (git-fixes).\n- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).\n- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).\n- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).\n- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).\n- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).\n- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).\n- drm/vc4: fix typo (git-fixes).\n- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).\n- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).\n- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).\n- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).\n- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).\n- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).\n- fbdev: imsttfb: fix a resource leak in probe (git-fixes).\n- fbdev: imsttfb: fix double free in probe() (git-fixes).\n- fbdev: omapfb: Drop unused remove function (git-fixes).\n- firewire: core: fix possible memory leak in create_units() (git-fixes).\n- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).\n- gpio: mockup: fix kerneldoc (git-fixes).\n- gpio: mockup: remove unused field (git-fixes).\n- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).\n- hv: simplify sysctl registration (git-fixes).\n- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).\n- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).\n- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).\n- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).\n- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).\n- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).\n- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).\n- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).\n- i2c: dev: copy userspace array safely (git-fixes).\n- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).\n- i2c: iproc: handle invalid slave state (git-fixes).\n- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).\n- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).\n- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).\n- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).\n- i3c: master: cdns: Fix reading status register (git-fixes).\n- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).\n- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).\n- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).\n- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).\n- i3c: master: svc: fix race condition in ibi work thread (git-fixes).\n- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).\n- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).\n- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).\n- idpf: add RX splitq napi poll support (bsc#1215458).\n- idpf: add SRIOV support and other ndo_ops (bsc#1215458).\n- idpf: add TX splitq napi poll support (bsc#1215458).\n- idpf: add controlq init and reset checks (bsc#1215458).\n- idpf: add core init and interrupt request (bsc#1215458).\n- idpf: add create vport and netdev configuration (bsc#1215458).\n- idpf: add ethtool callbacks (bsc#1215458).\n- idpf: add module register and probe functionality (bsc#1215458).\n- idpf: add ptypes and MAC filter support (bsc#1215458).\n- idpf: add singleq start_xmit and napi poll (bsc#1215458).\n- idpf: add splitq start_xmit (bsc#1215458).\n- idpf: cancel mailbox work in error path (bsc#1215458).\n- idpf: configure resources for RX queues (bsc#1215458).\n- idpf: configure resources for TX queues (bsc#1215458).\n- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).\n- idpf: initialize interrupts and enable vport (bsc#1215458).\n- idpf: set scheduling mode for completion queue (bsc#1215458).\n- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).\n- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).\n- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).\n- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).\n- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).\n- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).\n- leds: turris-omnia: Do not use SMBUS calls (git-fixes).\n- lsm: fix default return value for inode_getsecctx (git-fixes).\n- lsm: fix default return value for vm_enough_memory (git-fixes).\n- media: bttv: fix use after free error due to btv->timeout timer (git-fixes).\n- media: ccs: Correctly initialise try compose rectangle (git-fixes).\n- media: ccs: Fix driver quirk struct documentation (git-fixes).\n- media: cedrus: Fix clock/reset sequence (git-fixes).\n- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).\n- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).\n- media: imon: fix access to invalid resource for the second interface (git-fixes).\n- media: lirc: drop trailing space from scancode transmit (git-fixes).\n- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).\n- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).\n- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).\n- media: qcom: camss: Fix vfe_get() error jump (git-fixes).\n- media: sharp: fix sharp encoding (git-fixes).\n- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).\n- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).\n- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).\n- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).\n- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).\n- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).\n- media: vidtv: psi: Add check for kstrdup (git-fixes).\n- media: vivid: avoid integer overflow (git-fixes).\n- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).\n- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).\n- mfd: dln2: Fix double put in dln2_probe (git-fixes).\n- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).\n- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).\n- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).\n- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).\n- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).\n- mmc: block: Retry commands in CQE error recovery (git-fixes).\n- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).\n- mmc: cqhci: Increase recovery halt timeout (git-fixes).\n- mmc: cqhci: Warn of halt or task clear failure (git-fixes).\n- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).\n- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).\n- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).\n- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).\n- mmc: vub300: fix an error code (git-fixes).\n- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).\n- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).\n- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).\n- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).\n- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).\n- net: Avoid address overwrite in kernel_connect (bsc#1216861).\n- net: add macro netif_subqueue_completed_wake (bsc#1215458).\n- net: fix use-after-free in tw_timer_handler (bsc#1217195).\n- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).\n- net: mana: Fix return type of mana_start_xmit() (git-fixes).\n- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).\n- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).\n- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).\n- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).\n- nvme: update firmware version after commit (bsc#1215292).\n- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).\n- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).\n- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).\n- pinctrl: avoid reload of p state in list iteration (git-fixes).\n- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).\n- platform/x86: wmi: Fix opening of char device (git-fixes).\n- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).\n- platform/x86: wmi: remove unnecessary initializations (git-fixes).\n- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).\n- pwm: Fix double shift bug (git-fixes).\n- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).\n- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).\n- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).\n- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).\n- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).\n- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).\n- r8152: Release firmware if we have an error in probe (git-fixes).\n- r8152: Run the unload routine if we have errors during probe (git-fixes).\n- regmap: Ensure range selector registers are updated after cache sync (git-fixes).\n- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).\n- regmap: prevent noinc writes from clobbering cache (git-fixes).\n- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).\n- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).\n- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).\n- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).\n- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).\n- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).\n- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).\n- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).\n- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).\n- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).\n- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).\n- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).\n- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).\n- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).\n- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).\n- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).\n- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).\n- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).\n- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).\n- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).\n- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).\n- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).\n- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).\n- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).\n- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).\n- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).\n- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).\n- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).\n- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).\n- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).\n- selftests/efivarfs: create-read: fix a resource leak (git-fixes).\n- selftests/pidfd: Fix ksft print formats (git-fixes).\n- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).\n- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).\n- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).\n- seq_buf: fix a misleading comment (git-fixes).\n- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).\n- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).\n- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).\n- spi: nxp-fspi: use the correct ioremap function (git-fixes).\n- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).\n- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).\n- staging: media: ipu3: remove ftrace-like logging (git-fixes).\n- string.h: add array-wrappers for (v)memdup_user() (git-fixes).\n- supported.conf: marked idpf supported\n- thermal: core: prevent potential string overflow (git-fixes).\n- treewide: Spelling fix in comment (git-fixes).\n- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).\n- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).\n- tty: 8250: Add support for Brainboxes UP cards (git-fixes).\n- tty: 8250: Add support for Intashield IS-100 (git-fixes).\n- tty: 8250: Add support for Intashield IX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).\n- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).\n- tty: 8250: Fix port count of PX-257 (git-fixes).\n- tty: 8250: Fix up PX-803/PX-857 (git-fixes).\n- tty: 8250: Remove UC-257 and UC-431 (git-fixes).\n- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).\n- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).\n- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).\n- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).\n- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).\n- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).\n- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).\n- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).\n- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).\n- usb: dwc3: Fix default mode initialization (git-fixes).\n- usb: dwc3: set the dma max_seg_size (git-fixes).\n- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).\n- usb: raw-gadget: properly handle interrupted requests (git-fixes).\n- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).\n- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).\n- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).\n- virtchnl: add virtchnl version 2 ops (bsc#1215458).\n- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).\n- wifi: ath10k: fix clang-specific fortify warning (git-fixes).\n- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).\n- wifi: ath11k: fix dfs radar event locking (git-fixes).\n- wifi: ath11k: fix htt pktlog locking (git-fixes).\n- wifi: ath11k: fix temperature event locking (git-fixes).\n- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).\n- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).\n- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).\n- wifi: iwlwifi: empty overflow queue during flush (git-fixes).\n- wifi: iwlwifi: honor the enable_ini value (git-fixes).\n- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).\n- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).\n- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).\n- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).\n- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).\n- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).\n- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).\n- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).\n- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).\n- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).\n- x86/hyperv: fix a warning in mshyperv.h (git-fixes).\n- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).\n- x86/sev: Fix calculation of end address based on number of pages (git-fixes).\n- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).\n- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: add attr state machine tracepoints (git-fixes).\n- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).\n- xfs: constify btree function parameters that are not modified (git-fixes).\n- xfs: convert AGF log flags to unsigned (git-fixes).\n- xfs: convert AGI log flags to unsigned (git-fixes).\n- xfs: convert attr type flags to unsigned (git-fixes).\n- xfs: convert bmap extent type flags to unsigned (git-fixes).\n- xfs: convert bmapi flags to unsigned (git-fixes).\n- xfs: convert btree buffer log flags to unsigned (git-fixes).\n- xfs: convert buffer flags to unsigned (git-fixes).\n- xfs: convert buffer log item flags to unsigned (git-fixes).\n- xfs: convert da btree operations flags to unsigned (git-fixes).\n- xfs: convert dquot flags to unsigned (git-fixes).\n- xfs: convert inode lock flags to unsigned (git-fixes).\n- xfs: convert log item tracepoint flags to unsigned (git-fixes).\n- xfs: convert log ticket and iclog flags to unsigned (git-fixes).\n- xfs: convert quota options flags to unsigned (git-fixes).\n- xfs: convert scrub type flags to unsigned (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).\n- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).\n- xfs: make the key parameters to all btree key comparison functions const (git-fixes).\n- xfs: make the key parameters to all btree query range functions const (git-fixes).\n- xfs: make the keys and records passed to btree inorder functions const (git-fixes).\n- xfs: make the pointer passed to btree set_root functions const (git-fixes).\n- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).\n- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).\n- xfs: mark the record passed into btree init_key functions as const (git-fixes).\n- xfs: mark the record passed into xchk_btree functions as const (git-fixes).\n- xfs: remove xfs_btree_cur_t typedef (git-fixes).\n- xfs: rename i_disk_size fields in ftrace output (git-fixes).\n- xfs: resolve fork names in trace output (git-fixes).\n- xfs: standardize AG block number formatting in ftrace output (git-fixes).\n- xfs: standardize AG number formatting in ftrace output (git-fixes).\n- xfs: standardize daddr formatting in ftrace output (git-fixes).\n- xfs: standardize inode generation formatting in ftrace output (git-fixes).\n- xfs: standardize inode number formatting in ftrace output (git-fixes).\n- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).\n- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).\n- xhci: Enable RPM on controllers that support low-power states (git-fixes).\n- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-4810,SUSE-SLE-Micro-5.3-2023-4810,SUSE-SLE-Micro-5.4-2023-4810,SUSE-SLE-Module-Basesystem-15-SP4-2023-4810,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4810,SUSE-SLE-Module-Legacy-15-SP4-2023-4810,SUSE-SLE-Module-Live-Patching-15-SP4-2023-4810,SUSE-SLE-Product-HA-15-SP4-2023-4810,SUSE-SLE-Product-WE-15-SP4-2023-4810,openSUSE-Leap-Micro-5.3-2023-4810,openSUSE-Leap-Micro-5.4-2023-4810,openSUSE-SLE-15.4-2023-4810", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4810-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:4810-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20234810-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:4810-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html", }, { category: "self", summary: "SUSE Bug 1084909", url: "https://bugzilla.suse.com/1084909", }, { category: "self", summary: "SUSE Bug 1210447", url: "https://bugzilla.suse.com/1210447", }, { category: "self", summary: "SUSE Bug 1214286", url: "https://bugzilla.suse.com/1214286", }, { category: "self", summary: "SUSE Bug 1214976", url: "https://bugzilla.suse.com/1214976", }, { category: "self", summary: "SUSE Bug 1215124", url: "https://bugzilla.suse.com/1215124", }, { category: "self", summary: "SUSE Bug 1215292", url: "https://bugzilla.suse.com/1215292", }, { category: "self", summary: "SUSE Bug 1215420", url: "https://bugzilla.suse.com/1215420", }, { category: "self", summary: "SUSE Bug 1215458", url: "https://bugzilla.suse.com/1215458", }, { category: "self", summary: "SUSE Bug 1215710", url: "https://bugzilla.suse.com/1215710", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216105", url: "https://bugzilla.suse.com/1216105", }, { category: "self", summary: "SUSE Bug 1216259", url: "https://bugzilla.suse.com/1216259", }, { category: "self", summary: "SUSE Bug 1216584", url: "https://bugzilla.suse.com/1216584", }, { category: "self", summary: "SUSE Bug 1216693", url: "https://bugzilla.suse.com/1216693", }, { category: "self", summary: "SUSE Bug 1216759", url: "https://bugzilla.suse.com/1216759", }, { category: "self", summary: "SUSE Bug 1216844", url: "https://bugzilla.suse.com/1216844", }, { category: "self", summary: "SUSE Bug 1216861", url: "https://bugzilla.suse.com/1216861", }, { category: "self", summary: "SUSE Bug 1216909", url: "https://bugzilla.suse.com/1216909", }, { category: "self", summary: "SUSE Bug 1216959", url: "https://bugzilla.suse.com/1216959", }, { category: "self", summary: "SUSE Bug 1216965", url: "https://bugzilla.suse.com/1216965", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217036", url: "https://bugzilla.suse.com/1217036", }, { category: "self", summary: "SUSE Bug 1217068", url: "https://bugzilla.suse.com/1217068", }, { category: "self", summary: "SUSE Bug 1217086", url: "https://bugzilla.suse.com/1217086", }, { category: "self", summary: "SUSE Bug 1217124", url: "https://bugzilla.suse.com/1217124", }, { category: "self", summary: "SUSE Bug 1217140", url: "https://bugzilla.suse.com/1217140", }, { category: "self", summary: "SUSE Bug 1217195", url: "https://bugzilla.suse.com/1217195", }, { category: "self", summary: "SUSE Bug 1217200", url: "https://bugzilla.suse.com/1217200", }, { category: "self", summary: "SUSE Bug 1217205", url: "https://bugzilla.suse.com/1217205", }, { category: "self", summary: "SUSE Bug 1217332", url: "https://bugzilla.suse.com/1217332", }, { category: "self", summary: "SUSE Bug 1217366", url: "https://bugzilla.suse.com/1217366", }, { category: "self", summary: "SUSE Bug 1217515", url: "https://bugzilla.suse.com/1217515", }, { category: "self", summary: "SUSE Bug 1217598", url: "https://bugzilla.suse.com/1217598", }, { category: "self", summary: "SUSE Bug 1217599", url: "https://bugzilla.suse.com/1217599", }, { category: "self", summary: "SUSE Bug 1217609", url: "https://bugzilla.suse.com/1217609", }, { category: "self", summary: "SUSE Bug 1217687", url: "https://bugzilla.suse.com/1217687", }, { category: "self", summary: "SUSE Bug 1217731", url: "https://bugzilla.suse.com/1217731", }, { category: "self", summary: "SUSE Bug 1217780", url: "https://bugzilla.suse.com/1217780", }, { category: "self", summary: "SUSE CVE CVE-2023-2006 page", url: "https://www.suse.com/security/cve/CVE-2023-2006/", }, { category: "self", summary: "SUSE CVE CVE-2023-25775 page", url: "https://www.suse.com/security/cve/CVE-2023-25775/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-39198 page", url: "https://www.suse.com/security/cve/CVE-2023-39198/", }, { category: "self", summary: "SUSE CVE CVE-2023-4244 page", url: "https://www.suse.com/security/cve/CVE-2023-4244/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-45871 page", url: "https://www.suse.com/security/cve/CVE-2023-45871/", }, { category: "self", summary: "SUSE CVE CVE-2023-46862 page", url: "https://www.suse.com/security/cve/CVE-2023-46862/", }, { category: "self", summary: "SUSE CVE CVE-2023-5158 page", url: "https://www.suse.com/security/cve/CVE-2023-5158/", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2023-6039 page", url: "https://www.suse.com/security/cve/CVE-2023-6039/", }, { category: "self", summary: "SUSE CVE CVE-2023-6176 page", url: "https://www.suse.com/security/cve/CVE-2023-6176/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-12-13T17:59:20Z", generator: { date: "2023-12-13T17:59:20Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:4810-1", initial_release_date: "2023-12-13T17:59:20Z", revision_history: [ { date: "2023-12-13T17:59:20Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-altera-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-altera-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-amazon-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-amazon-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-amazon-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-amd-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-amd-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-apm-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-apm-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-apple-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-apple-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-apple-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-arm-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-arm-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-cavium-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-cavium-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-exynos-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-exynos-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-freescale-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-freescale-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-lg-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-lg-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-marvell-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-marvell-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-qcom-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-qcom-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-renesas-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-renesas-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-socionext-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-socionext-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-sprd-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-sprd-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64", product: { name: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64", product_id: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", product: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", product_id: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", product: { name: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", product_id: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", product: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", product_id: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.100.1.aarch64", product: { name: "kernel-syms-5.14.21-150400.24.100.1.aarch64", product_id: "kernel-syms-5.14.21-150400.24.100.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product: { name: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", product_id: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", product_id: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.21-150400.24.100.2.noarch", product: { name: "kernel-devel-5.14.21-150400.24.100.2.noarch", product_id: "kernel-devel-5.14.21-150400.24.100.2.noarch", }, }, { category: "product_version", name: "kernel-docs-5.14.21-150400.24.100.1.noarch", product: { name: "kernel-docs-5.14.21-150400.24.100.1.noarch", product_id: "kernel-docs-5.14.21-150400.24.100.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.14.21-150400.24.100.1.noarch", product: { name: "kernel-docs-html-5.14.21-150400.24.100.1.noarch", product_id: "kernel-docs-html-5.14.21-150400.24.100.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.14.21-150400.24.100.2.noarch", product: { name: "kernel-macros-5.14.21-150400.24.100.2.noarch", product_id: "kernel-macros-5.14.21-150400.24.100.2.noarch", }, }, { category: "product_version", name: "kernel-source-5.14.21-150400.24.100.2.noarch", product: { name: "kernel-source-5.14.21-150400.24.100.2.noarch", product_id: "kernel-source-5.14.21-150400.24.100.2.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", product: { name: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", product_id: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-debug-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-debug-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", product: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", product_id: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", product: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", product_id: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", product: { name: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", product_id: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", product: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", product_id: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", product: { name: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", product_id: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", product_id: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-extra-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-extra-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-default-optional-5.14.21-150400.24.100.2.s390x", product_id: "kernel-default-optional-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", product: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", product_id: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", product_id: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x", product: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x", product_id: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.100.1.s390x", product: { name: "kernel-syms-5.14.21-150400.24.100.1.s390x", product_id: "kernel-syms-5.14.21-150400.24.100.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", product: { name: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", product_id: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", product_id: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-debug-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-debug-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", product: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", product_id: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", product_id: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", product: { name: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", product_id: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", product: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", product_id: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.100.1.x86_64", product: { name: "kernel-syms-5.14.21-150400.24.100.1.x86_64", product_id: "kernel-syms-5.14.21-150400.24.100.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", product_id: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.3", product: { name: "SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.4", product: { name: "SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP4", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP4", product: { name: "SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP4", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP4", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.3", product: { name: "openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.3", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.4", product: { name: "openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150400.24.100.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-devel-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150400.24.100.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-macros-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150400.24.100.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", }, product_reference: "kernel-docs-5.14.21-150400.24.100.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150400.24.100.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-source-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", }, product_reference: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", }, product_reference: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-allwinner-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-altera-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amazon-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-amazon-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-amd-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-amlogic-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-apm-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-apple-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-apple-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-arm-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-broadcom-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-cavium-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-exynos-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-freescale-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-lg-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-marvell-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-mediatek-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-nvidia-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-qcom-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-renesas-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-rockchip-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-socionext-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-sprd-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", }, product_reference: "dtb-xilinx-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-debug-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-debug-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-default-optional-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-default-optional-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-default-optional-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150400.24.100.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-devel-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150400.24.100.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", }, product_reference: "kernel-docs-5.14.21-150400.24.100.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.14.21-150400.24.100.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", }, product_reference: "kernel-docs-html-5.14.21-150400.24.100.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150400.24.100.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-macros-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.100.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150400.24.100.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-source-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", }, product_reference: "kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.100.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150400.24.100.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2023-2006", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2006", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2006", url: "https://www.suse.com/security/cve/CVE-2023-2006", }, { category: "external", summary: "SUSE Bug 1210447 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210447", }, { category: "external", summary: "SUSE Bug 1210457 for CVE-2023-2006", url: "https://bugzilla.suse.com/1210457", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "important", }, ], title: "CVE-2023-2006", }, { cve: "CVE-2023-25775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-25775", }, ], notes: [ { category: "general", text: "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-25775", url: "https://www.suse.com/security/cve/CVE-2023-25775", }, { category: "external", summary: "SUSE Bug 1216959 for CVE-2023-25775", url: "https://bugzilla.suse.com/1216959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-25775", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-39198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39198", }, ], notes: [ { category: "general", text: "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39198", url: "https://www.suse.com/security/cve/CVE-2023-39198", }, { category: "external", summary: "SUSE Bug 1216965 for CVE-2023-39198", url: "https://bugzilla.suse.com/1216965", }, { category: "external", summary: "SUSE Bug 1217116 for CVE-2023-39198", url: "https://bugzilla.suse.com/1217116", }, { category: "external", summary: "SUSE Bug 1219703 for CVE-2023-39198", url: "https://bugzilla.suse.com/1219703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "important", }, ], title: "CVE-2023-39198", }, { cve: "CVE-2023-4244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4244", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4244", url: "https://www.suse.com/security/cve/CVE-2023-4244", }, { category: "external", summary: "SUSE Bug 1215420 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215420", }, { category: "external", summary: "SUSE Bug 1215424 for CVE-2023-4244", url: "https://bugzilla.suse.com/1215424", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-4244", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-45871", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45871", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45871", url: "https://www.suse.com/security/cve/CVE-2023-45871", }, { category: "external", summary: "SUSE Bug 1216259 for CVE-2023-45871", url: "https://bugzilla.suse.com/1216259", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-45871", }, { cve: "CVE-2023-46862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46862", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46862", url: "https://www.suse.com/security/cve/CVE-2023-46862", }, { category: "external", summary: "SUSE Bug 1216693 for CVE-2023-46862", url: "https://bugzilla.suse.com/1216693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-46862", }, { cve: "CVE-2023-5158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5158", }, ], notes: [ { category: "general", text: "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5158", url: "https://www.suse.com/security/cve/CVE-2023-5158", }, { category: "external", summary: "SUSE Bug 1215710 for CVE-2023-5158", url: "https://bugzilla.suse.com/1215710", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-5158", }, { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2023-6039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6039", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6039", url: "https://www.suse.com/security/cve/CVE-2023-6039", }, { category: "external", summary: "SUSE Bug 1217068 for CVE-2023-6039", url: "https://bugzilla.suse.com/1217068", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "moderate", }, ], title: "CVE-2023-6039", }, { cve: "CVE-2023-6176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6176", }, ], notes: [ { category: "general", text: "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6176", url: "https://www.suse.com/security/cve/CVE-2023-6176", }, { category: "external", summary: "SUSE Bug 1217332 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217332", }, { category: "external", summary: "SUSE Bug 1217522 for CVE-2023-6176", url: "https://bugzilla.suse.com/1217522", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.100.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.100.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.100.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.100.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.100.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.100.2.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-12-13T17:59:20Z", details: "important", }, ], title: "CVE-2023-6176", }, ], }
suse-su-2024:0112-1
Vulnerability from csaf_suse
Published
2024-01-16 12:29
Modified
2024-01-16 12:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).
- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS (bsc#1210778).
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure (bsc#1216046).
- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253).
Patchnames
SUSE-2024-112,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-112
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237).\n- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).\n- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).\n- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS (bsc#1210778).\n- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).\n- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure (bsc#1216046).\n- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).\n- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).\n- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).\n- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).\n- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).\n- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).\n- CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253).\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-112,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-112", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0112-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:0112-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20240112-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:0112-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html", }, { category: "self", summary: "SUSE Bug 1179610", url: "https://bugzilla.suse.com/1179610", }, { category: "self", summary: "SUSE Bug 1205762", url: "https://bugzilla.suse.com/1205762", }, { category: "self", summary: "SUSE Bug 1210778", url: "https://bugzilla.suse.com/1210778", }, { category: "self", summary: "SUSE Bug 1212051", url: "https://bugzilla.suse.com/1212051", }, { category: "self", summary: "SUSE Bug 1212703", url: "https://bugzilla.suse.com/1212703", }, { category: "self", summary: "SUSE Bug 1215237", url: "https://bugzilla.suse.com/1215237", }, { category: "self", summary: "SUSE Bug 1215858", url: "https://bugzilla.suse.com/1215858", }, { category: "self", summary: "SUSE Bug 1215860", url: "https://bugzilla.suse.com/1215860", }, { category: "self", summary: "SUSE Bug 1216046", url: "https://bugzilla.suse.com/1216046", }, { category: "self", summary: "SUSE Bug 1216058", url: "https://bugzilla.suse.com/1216058", }, { category: "self", summary: "SUSE Bug 1216976", url: "https://bugzilla.suse.com/1216976", }, { category: "self", summary: "SUSE Bug 1217947", url: "https://bugzilla.suse.com/1217947", }, { category: "self", summary: "SUSE Bug 1218253", url: "https://bugzilla.suse.com/1218253", }, { category: "self", summary: "SUSE Bug 1218559", url: "https://bugzilla.suse.com/1218559", }, { category: "self", summary: "SUSE CVE CVE-2020-26555 page", url: "https://www.suse.com/security/cve/CVE-2020-26555/", }, { category: "self", summary: "SUSE CVE CVE-2022-45887 page", url: "https://www.suse.com/security/cve/CVE-2022-45887/", }, { category: "self", summary: "SUSE CVE CVE-2023-1206 page", url: "https://www.suse.com/security/cve/CVE-2023-1206/", }, { category: "self", summary: "SUSE CVE CVE-2023-31085 page", url: "https://www.suse.com/security/cve/CVE-2023-31085/", }, { category: "self", summary: "SUSE CVE CVE-2023-3111 page", url: "https://www.suse.com/security/cve/CVE-2023-3111/", }, { category: "self", summary: "SUSE CVE CVE-2023-39189 page", url: "https://www.suse.com/security/cve/CVE-2023-39189/", }, { category: "self", summary: "SUSE CVE CVE-2023-39192 page", url: "https://www.suse.com/security/cve/CVE-2023-39192/", }, { category: "self", summary: "SUSE CVE CVE-2023-39193 page", url: "https://www.suse.com/security/cve/CVE-2023-39193/", }, { category: "self", summary: "SUSE CVE CVE-2023-39197 page", url: "https://www.suse.com/security/cve/CVE-2023-39197/", }, { category: "self", summary: "SUSE CVE CVE-2023-45863 page", url: "https://www.suse.com/security/cve/CVE-2023-45863/", }, { category: "self", summary: "SUSE CVE CVE-2023-51779 page", url: "https://www.suse.com/security/cve/CVE-2023-51779/", }, { category: "self", summary: "SUSE CVE CVE-2023-6606 page", url: "https://www.suse.com/security/cve/CVE-2023-6606/", }, { category: "self", summary: "SUSE CVE CVE-2023-6932 page", url: "https://www.suse.com/security/cve/CVE-2023-6932/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2024-01-16T12:29:23Z", generator: { date: "2024-01-16T12:29:23Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:0112-1", initial_release_date: "2024-01-16T12:29:23Z", revision_history: [ { date: "2024-01-16T12:29:23Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-debug-3.0.101-108.150.1.i586", product: { name: "kernel-debug-3.0.101-108.150.1.i586", product_id: "kernel-debug-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-debug-base-3.0.101-108.150.1.i586", product: { name: "kernel-debug-base-3.0.101-108.150.1.i586", product_id: "kernel-debug-base-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-debug-devel-3.0.101-108.150.1.i586", product: { name: "kernel-debug-devel-3.0.101-108.150.1.i586", product_id: "kernel-debug-devel-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-debug-extra-3.0.101-108.150.1.i586", product: { name: "kernel-debug-extra-3.0.101-108.150.1.i586", product_id: "kernel-debug-extra-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-debug-hmac-3.0.101-108.150.1.i586", product: { name: "kernel-debug-hmac-3.0.101-108.150.1.i586", product_id: "kernel-debug-hmac-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-default-3.0.101-108.150.1.i586", product: { name: "kernel-default-3.0.101-108.150.1.i586", product_id: "kernel-default-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.150.1.i586", product: { name: "kernel-default-base-3.0.101-108.150.1.i586", product_id: "kernel-default-base-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.150.1.i586", product: { name: "kernel-default-devel-3.0.101-108.150.1.i586", product_id: "kernel-default-devel-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-default-extra-3.0.101-108.150.1.i586", product: { name: "kernel-default-extra-3.0.101-108.150.1.i586", product_id: "kernel-default-extra-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-default-hmac-3.0.101-108.150.1.i586", product: { name: "kernel-default-hmac-3.0.101-108.150.1.i586", product_id: "kernel-default-hmac-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-108.150.1.i586", product: { name: "kernel-ec2-3.0.101-108.150.1.i586", product_id: "kernel-ec2-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-108.150.1.i586", product: { name: "kernel-ec2-base-3.0.101-108.150.1.i586", product_id: "kernel-ec2-base-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-108.150.1.i586", product: { name: "kernel-ec2-devel-3.0.101-108.150.1.i586", product_id: "kernel-ec2-devel-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-ec2-extra-3.0.101-108.150.1.i586", product: { name: "kernel-ec2-extra-3.0.101-108.150.1.i586", product_id: "kernel-ec2-extra-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-ec2-hmac-3.0.101-108.150.1.i586", product: { name: "kernel-ec2-hmac-3.0.101-108.150.1.i586", product_id: "kernel-ec2-hmac-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-pae-3.0.101-108.150.1.i586", product: { name: "kernel-pae-3.0.101-108.150.1.i586", product_id: "kernel-pae-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-pae-base-3.0.101-108.150.1.i586", product: { name: "kernel-pae-base-3.0.101-108.150.1.i586", product_id: "kernel-pae-base-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-pae-devel-3.0.101-108.150.1.i586", product: { name: "kernel-pae-devel-3.0.101-108.150.1.i586", product_id: "kernel-pae-devel-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-pae-extra-3.0.101-108.150.1.i586", product: { name: "kernel-pae-extra-3.0.101-108.150.1.i586", product_id: "kernel-pae-extra-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-pae-hmac-3.0.101-108.150.1.i586", product: { name: "kernel-pae-hmac-3.0.101-108.150.1.i586", product_id: "kernel-pae-hmac-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.150.1.i586", product: { name: "kernel-source-3.0.101-108.150.1.i586", product_id: "kernel-source-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-source-vanilla-3.0.101-108.150.1.i586", product: { name: "kernel-source-vanilla-3.0.101-108.150.1.i586", product_id: "kernel-source-vanilla-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.150.1.i586", product: { name: "kernel-syms-3.0.101-108.150.1.i586", product_id: "kernel-syms-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.150.1.i586", product: { name: "kernel-trace-3.0.101-108.150.1.i586", product_id: "kernel-trace-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.150.1.i586", product: { name: "kernel-trace-base-3.0.101-108.150.1.i586", product_id: "kernel-trace-base-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.150.1.i586", product: { name: "kernel-trace-devel-3.0.101-108.150.1.i586", product_id: "kernel-trace-devel-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-trace-extra-3.0.101-108.150.1.i586", product: { name: "kernel-trace-extra-3.0.101-108.150.1.i586", product_id: "kernel-trace-extra-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-trace-hmac-3.0.101-108.150.1.i586", product: { name: "kernel-trace-hmac-3.0.101-108.150.1.i586", product_id: "kernel-trace-hmac-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-vanilla-3.0.101-108.150.1.i586", product: { name: "kernel-vanilla-3.0.101-108.150.1.i586", product_id: "kernel-vanilla-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-vanilla-base-3.0.101-108.150.1.i586", product: { name: "kernel-vanilla-base-3.0.101-108.150.1.i586", product_id: "kernel-vanilla-base-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-vanilla-devel-3.0.101-108.150.1.i586", product: { name: "kernel-vanilla-devel-3.0.101-108.150.1.i586", product_id: "kernel-vanilla-devel-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-vanilla-hmac-3.0.101-108.150.1.i586", product: { name: "kernel-vanilla-hmac-3.0.101-108.150.1.i586", product_id: "kernel-vanilla-hmac-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-xen-3.0.101-108.150.1.i586", product: { name: "kernel-xen-3.0.101-108.150.1.i586", product_id: "kernel-xen-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-108.150.1.i586", product: { name: "kernel-xen-base-3.0.101-108.150.1.i586", product_id: "kernel-xen-base-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-108.150.1.i586", product: { name: "kernel-xen-devel-3.0.101-108.150.1.i586", product_id: "kernel-xen-devel-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-xen-extra-3.0.101-108.150.1.i586", product: { name: "kernel-xen-extra-3.0.101-108.150.1.i586", product_id: "kernel-xen-extra-3.0.101-108.150.1.i586", }, }, { category: "product_version", name: "kernel-xen-hmac-3.0.101-108.150.1.i586", product: { name: "kernel-xen-hmac-3.0.101-108.150.1.i586", product_id: "kernel-xen-hmac-3.0.101-108.150.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "kernel-source-3.0.101-108.150.1.ia64", product: { name: "kernel-source-3.0.101-108.150.1.ia64", product_id: "kernel-source-3.0.101-108.150.1.ia64", }, }, { category: "product_version", name: "kernel-source-vanilla-3.0.101-108.150.1.ia64", product: { name: "kernel-source-vanilla-3.0.101-108.150.1.ia64", product_id: "kernel-source-vanilla-3.0.101-108.150.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "kernel-docs-3.0.101-108.150.1.noarch", product: { name: "kernel-docs-3.0.101-108.150.1.noarch", product_id: "kernel-docs-3.0.101-108.150.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-source-3.0.101-108.150.1.ppc", product: { name: "kernel-source-3.0.101-108.150.1.ppc", product_id: "kernel-source-3.0.101-108.150.1.ppc", }, }, { category: "product_version", name: "kernel-source-vanilla-3.0.101-108.150.1.ppc", product: { name: "kernel-source-vanilla-3.0.101-108.150.1.ppc", product_id: "kernel-source-vanilla-3.0.101-108.150.1.ppc", }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "kernel-source-3.0.101-108.150.1.ppc64", product: { name: "kernel-source-3.0.101-108.150.1.ppc64", product_id: "kernel-source-3.0.101-108.150.1.ppc64", }, }, { category: "product_version", name: "kernel-source-vanilla-3.0.101-108.150.1.ppc64", product: { name: "kernel-source-vanilla-3.0.101-108.150.1.ppc64", product_id: "kernel-source-vanilla-3.0.101-108.150.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "kernel-source-3.0.101-108.150.1.s390", product: { name: "kernel-source-3.0.101-108.150.1.s390", product_id: "kernel-source-3.0.101-108.150.1.s390", }, }, { category: "product_version", name: "kernel-source-vanilla-3.0.101-108.150.1.s390", product: { name: "kernel-source-vanilla-3.0.101-108.150.1.s390", product_id: "kernel-source-vanilla-3.0.101-108.150.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "kernel-source-3.0.101-108.150.1.s390x", product: { name: "kernel-source-3.0.101-108.150.1.s390x", product_id: "kernel-source-3.0.101-108.150.1.s390x", }, }, { category: "product_version", name: "kernel-source-vanilla-3.0.101-108.150.1.s390x", product: { name: "kernel-source-vanilla-3.0.101-108.150.1.s390x", product_id: "kernel-source-vanilla-3.0.101-108.150.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-debug-3.0.101-108.150.1.x86_64", product: { name: "kernel-debug-3.0.101-108.150.1.x86_64", product_id: "kernel-debug-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-3.0.101-108.150.1.x86_64", product: { name: "kernel-debug-base-3.0.101-108.150.1.x86_64", product_id: "kernel-debug-base-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-3.0.101-108.150.1.x86_64", product: { name: "kernel-debug-devel-3.0.101-108.150.1.x86_64", product_id: "kernel-debug-devel-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-extra-3.0.101-108.150.1.x86_64", product: { name: "kernel-debug-extra-3.0.101-108.150.1.x86_64", product_id: "kernel-debug-extra-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-hmac-3.0.101-108.150.1.x86_64", product: { name: "kernel-debug-hmac-3.0.101-108.150.1.x86_64", product_id: "kernel-debug-hmac-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-default-3.0.101-108.150.1.x86_64", product: { name: "kernel-default-3.0.101-108.150.1.x86_64", product_id: "kernel-default-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.150.1.x86_64", product: { name: "kernel-default-base-3.0.101-108.150.1.x86_64", product_id: "kernel-default-base-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.150.1.x86_64", product: { name: "kernel-default-devel-3.0.101-108.150.1.x86_64", product_id: "kernel-default-devel-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-3.0.101-108.150.1.x86_64", product: { name: "kernel-default-extra-3.0.101-108.150.1.x86_64", product_id: "kernel-default-extra-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-default-hmac-3.0.101-108.150.1.x86_64", product: { name: "kernel-default-hmac-3.0.101-108.150.1.x86_64", product_id: "kernel-default-hmac-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-108.150.1.x86_64", product: { name: "kernel-ec2-3.0.101-108.150.1.x86_64", product_id: "kernel-ec2-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-108.150.1.x86_64", product: { name: "kernel-ec2-base-3.0.101-108.150.1.x86_64", product_id: "kernel-ec2-base-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-108.150.1.x86_64", product: { name: "kernel-ec2-devel-3.0.101-108.150.1.x86_64", product_id: "kernel-ec2-devel-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-extra-3.0.101-108.150.1.x86_64", product: { name: "kernel-ec2-extra-3.0.101-108.150.1.x86_64", product_id: "kernel-ec2-extra-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-hmac-3.0.101-108.150.1.x86_64", product: { name: "kernel-ec2-hmac-3.0.101-108.150.1.x86_64", product_id: "kernel-ec2-hmac-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.150.1.x86_64", product: { name: "kernel-source-3.0.101-108.150.1.x86_64", product_id: "kernel-source-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-source-vanilla-3.0.101-108.150.1.x86_64", product: { name: "kernel-source-vanilla-3.0.101-108.150.1.x86_64", product_id: "kernel-source-vanilla-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.150.1.x86_64", product: { name: "kernel-syms-3.0.101-108.150.1.x86_64", product_id: "kernel-syms-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.150.1.x86_64", product: { name: "kernel-trace-3.0.101-108.150.1.x86_64", product_id: "kernel-trace-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.150.1.x86_64", product: { name: "kernel-trace-base-3.0.101-108.150.1.x86_64", product_id: "kernel-trace-base-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.150.1.x86_64", product: { name: "kernel-trace-devel-3.0.101-108.150.1.x86_64", product_id: "kernel-trace-devel-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-extra-3.0.101-108.150.1.x86_64", product: { name: "kernel-trace-extra-3.0.101-108.150.1.x86_64", product_id: "kernel-trace-extra-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-hmac-3.0.101-108.150.1.x86_64", product: { name: "kernel-trace-hmac-3.0.101-108.150.1.x86_64", product_id: "kernel-trace-hmac-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-3.0.101-108.150.1.x86_64", product: { name: "kernel-vanilla-3.0.101-108.150.1.x86_64", product_id: "kernel-vanilla-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-3.0.101-108.150.1.x86_64", product: { name: "kernel-vanilla-base-3.0.101-108.150.1.x86_64", product_id: "kernel-vanilla-base-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-3.0.101-108.150.1.x86_64", product: { name: "kernel-vanilla-devel-3.0.101-108.150.1.x86_64", product_id: "kernel-vanilla-devel-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-hmac-3.0.101-108.150.1.x86_64", product: { name: "kernel-vanilla-hmac-3.0.101-108.150.1.x86_64", product_id: "kernel-vanilla-hmac-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.0.101-108.150.1.x86_64", product: { name: "kernel-xen-3.0.101-108.150.1.x86_64", product_id: "kernel-xen-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-108.150.1.x86_64", product: { name: "kernel-xen-base-3.0.101-108.150.1.x86_64", product_id: "kernel-xen-base-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-108.150.1.x86_64", product: { name: "kernel-xen-devel-3.0.101-108.150.1.x86_64", product_id: "kernel-xen-devel-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-extra-3.0.101-108.150.1.x86_64", product: { name: "kernel-xen-extra-3.0.101-108.150.1.x86_64", product_id: "kernel-xen-extra-3.0.101-108.150.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-hmac-3.0.101-108.150.1.x86_64", product: { name: "kernel-xen-hmac-3.0.101-108.150.1.x86_64", product_id: "kernel-xen-hmac-3.0.101-108.150.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product: { name: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-default-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-source-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-syms-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-trace-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-xen-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-108.150.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", product_id: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-108.150.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE", }, ], }, vulnerabilities: [ { cve: "CVE-2020-26555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-26555", }, ], notes: [ { category: "general", text: "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-26555", url: "https://www.suse.com/security/cve/CVE-2020-26555", }, { category: "external", summary: "SUSE Bug 1179610 for CVE-2020-26555", url: "https://bugzilla.suse.com/1179610", }, { category: "external", summary: "SUSE Bug 1215237 for CVE-2020-26555", url: "https://bugzilla.suse.com/1215237", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2020-26555", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2020-26555", }, { cve: "CVE-2022-45887", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45887", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45887", url: "https://www.suse.com/security/cve/CVE-2022-45887", }, { category: "external", summary: "SUSE Bug 1205762 for CVE-2022-45887", url: "https://bugzilla.suse.com/1205762", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2022-45887", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2022-45887", }, { cve: "CVE-2023-1206", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1206", }, ], notes: [ { category: "general", text: "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel's IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1206", url: "https://www.suse.com/security/cve/CVE-2023-1206", }, { category: "external", summary: "SUSE Bug 1212703 for CVE-2023-1206", url: "https://bugzilla.suse.com/1212703", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-1206", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-1206", }, { cve: "CVE-2023-31085", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31085", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31085", url: "https://www.suse.com/security/cve/CVE-2023-31085", }, { category: "external", summary: "SUSE Bug 1210778 for CVE-2023-31085", url: "https://bugzilla.suse.com/1210778", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-31085", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-31085", }, { cve: "CVE-2023-3111", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3111", }, ], notes: [ { category: "general", text: "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3111", url: "https://www.suse.com/security/cve/CVE-2023-3111", }, { category: "external", summary: "SUSE Bug 1212051 for CVE-2023-3111", url: "https://bugzilla.suse.com/1212051", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-3111", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-3111", }, { cve: "CVE-2023-39189", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39189", }, ], notes: [ { category: "general", text: "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39189", url: "https://www.suse.com/security/cve/CVE-2023-39189", }, { category: "external", summary: "SUSE Bug 1216046 for CVE-2023-39189", url: "https://bugzilla.suse.com/1216046", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39189", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-39189", }, { cve: "CVE-2023-39192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39192", }, ], notes: [ { category: "general", text: "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39192", url: "https://www.suse.com/security/cve/CVE-2023-39192", }, { category: "external", summary: "SUSE Bug 1215858 for CVE-2023-39192", url: "https://bugzilla.suse.com/1215858", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39192", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-39192", }, { cve: "CVE-2023-39193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39193", }, ], notes: [ { category: "general", text: "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39193", url: "https://www.suse.com/security/cve/CVE-2023-39193", }, { category: "external", summary: "SUSE Bug 1215860 for CVE-2023-39193", url: "https://bugzilla.suse.com/1215860", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39193", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-39193", }, { cve: "CVE-2023-39197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39197", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39197", url: "https://www.suse.com/security/cve/CVE-2023-39197", }, { category: "external", summary: "SUSE Bug 1216976 for CVE-2023-39197", url: "https://bugzilla.suse.com/1216976", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39197", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "low", }, ], title: "CVE-2023-39197", }, { cve: "CVE-2023-45863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-45863", }, ], notes: [ { category: "general", text: "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-45863", url: "https://www.suse.com/security/cve/CVE-2023-45863", }, { category: "external", summary: "SUSE Bug 1216058 for CVE-2023-45863", url: "https://bugzilla.suse.com/1216058", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-45863", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-45863", }, { cve: "CVE-2023-51779", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-51779", }, ], notes: [ { category: "general", text: "bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-51779", url: "https://www.suse.com/security/cve/CVE-2023-51779", }, { category: "external", summary: "SUSE Bug 1218559 for CVE-2023-51779", url: "https://bugzilla.suse.com/1218559", }, { category: "external", summary: "SUSE Bug 1218610 for CVE-2023-51779", url: "https://bugzilla.suse.com/1218610", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-51779", url: "https://bugzilla.suse.com/1220015", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-51779", url: "https://bugzilla.suse.com/1220191", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-51779", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-51779", url: "https://bugzilla.suse.com/1221598", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-51779", }, { cve: "CVE-2023-6606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6606", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6606", url: "https://www.suse.com/security/cve/CVE-2023-6606", }, { category: "external", summary: "SUSE Bug 1217947 for CVE-2023-6606", url: "https://bugzilla.suse.com/1217947", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-6606", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-6606", }, { cve: "CVE-2023-6932", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6932", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6932", url: "https://www.suse.com/security/cve/CVE-2023-6932", }, { category: "external", summary: "SUSE Bug 1218253 for CVE-2023-6932", url: "https://bugzilla.suse.com/1218253", }, { category: "external", summary: "SUSE Bug 1218255 for CVE-2023-6932", url: "https://bugzilla.suse.com/1218255", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-6932", url: "https://bugzilla.suse.com/1220015", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-6932", url: "https://bugzilla.suse.com/1220191", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-6932", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-6932", url: "https://bugzilla.suse.com/1221598", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.150.1.x86_64", "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.150.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-01-16T12:29:23Z", details: "moderate", }, ], title: "CVE-2023-6932", }, ], }
gsd-2023-39197
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
Aliases
Aliases
{ GSD: { alias: "CVE-2023-39197", id: "GSD-2023-39197", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2023-39197", ], details: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", id: "GSD-2023-39197", modified: "2023-12-13T01:20:33.470113Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2023-39197", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Red Hat Enterprise Linux 6", version: { version_data: [ { version_value: "not down converted", x_cve_json_5_version_data: { defaultStatus: "unknown", }, }, ], }, }, { product_name: "Red Hat Enterprise Linux 7", version: { version_data: [ { version_value: "not down converted", x_cve_json_5_version_data: { defaultStatus: "unknown", }, }, { version_value: "not down converted", x_cve_json_5_version_data: { defaultStatus: "unknown", }, }, ], }, }, { product_name: "Red Hat Enterprise Linux 8", version: { version_data: [ { version_value: "not down converted", x_cve_json_5_version_data: { defaultStatus: "unaffected", }, }, { version_value: "not down converted", x_cve_json_5_version_data: { defaultStatus: "unaffected", }, }, ], }, }, { product_name: "Red Hat Enterprise Linux 9", version: { version_data: [ { version_value: "not down converted", x_cve_json_5_version_data: { defaultStatus: "unaffected", }, }, { version_value: "not down converted", x_cve_json_5_version_data: { defaultStatus: "unaffected", }, }, ], }, }, ], }, vendor_name: "Red Hat", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", }, ], }, impact: { cvss: [ { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, ], }, problemtype: { problemtype_data: [ { description: [ { cweId: "CWE-125", lang: "eng", value: "Out-of-bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://access.redhat.com/security/cve/CVE-2023-39197", refsource: "MISC", url: "https://access.redhat.com/security/cve/CVE-2023-39197", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=2218342", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2218342", }, ], }, }, "nvd.nist.gov": { cve: { configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], descriptions: [ { lang: "en", value: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", }, { lang: "es", value: "Se encontró una vulnerabilidad de lectura fuera de los límites en Netfilter Connection Tracking (conntrack) en el kernel de Linux. Esta falla permite que un usuario remoto revele información confidencial a través del protocolo DCCP.", }, ], id: "CVE-2023-39197", lastModified: "2024-01-30T02:04:00.813", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 1.4, source: "secalert@redhat.com", type: "Secondary", }, ], }, published: "2024-01-23T03:15:11.683", references: [ { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/security/cve/CVE-2023-39197", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2218342", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "secalert@redhat.com", type: "Secondary", }, ], }, }, }, }
fkie_cve-2023-39197
Vulnerability from fkie_nvd
Published
2024-01-23 03:15
Modified
2024-11-21 08:14
Severity ?
4.0 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-39197 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2218342 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-39197 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2218342 | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
fedoraproject | fedora | 38 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "79658A41-FEEA-42AF-93D9-A85F7CF2123A", versionEndExcluding: "5.4.251", versionStartIncluding: "2.6.26", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "43CAE50A-4A6C-488E-813C-F8DB77C13C8B", versionEndExcluding: "5.10.188", versionStartIncluding: "5.5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "EC77775B-EC31-4966-966C-1286C02B2A85", versionEndExcluding: "5.15.121", versionStartIncluding: "5.11", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "9BD1D4A1-304D-4187-8178-6D7C0050B1AF", versionEndExcluding: "6.1.39", versionStartIncluding: "5.16", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "95CB4836-7F5D-4C20-B025-8E046EC87B78", versionEndExcluding: "6.3.13", versionStartIncluding: "6.2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "6AB81046-CB69-4115-924C-963B37C41385", versionEndExcluding: "6.4.4", versionStartIncluding: "6.4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", matchCriteriaId: "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", }, { lang: "es", value: "Se encontró una vulnerabilidad de lectura fuera de los límites en Netfilter Connection Tracking (conntrack) en el kernel de Linux. Esta falla permite que un usuario remoto revele información confidencial a través del protocolo DCCP.", }, ], id: "CVE-2023-39197", lastModified: "2024-11-21T08:14:53.713", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 1.4, source: "secalert@redhat.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-01-23T03:15:11.683", references: [ { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/security/cve/CVE-2023-39197", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2218342", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/security/cve/CVE-2023-39197", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2218342", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-w83m-85f8-627v
Vulnerability from github
Published
2024-01-23 03:31
Modified
2024-01-23 03:31
Severity ?
Details
An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
{ affected: [], aliases: [ "CVE-2023-39197", ], database_specific: { cwe_ids: [ "CWE-125", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2024-01-23T03:15:11Z", severity: "MODERATE", }, details: "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", id: "GHSA-w83m-85f8-627v", modified: "2024-01-23T03:31:08Z", published: "2024-01-23T03:31:08Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-39197", }, { type: "WEB", url: "https://access.redhat.com/security/cve/CVE-2023-39197", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2218342", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.