Vulnerability from csaf_suse
Published
2023-08-22 15:04
Modified
2023-08-22 15:04
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).
- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).
- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).
- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).
- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).
- CVE-2023-3863: Fixed a use-after-free flaw in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC. This flaw allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).
- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
- CVE-2023-38409: Fixed an issue in set_con2fb_map in drivers/video/fbdev/core/fbcon.c. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info) (bsc#1213417).
- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
The following non-security bugs were fixed:
- ACPI: CPPC: Add ACPI disabled check to acpi_cpc_valid() (bsc#1212445).
- ACPI: CPPC: Add definition for undefined FADT preferred PM profile value (bsc#1212445).
- ACPI: utils: Fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).
- ACPI/IORT: Remove erroneous id_count check in iort_node_get_rmr_info() (git-fixes).
- afs: Adjust ACK interpretation to try and cope with NAT (git-fixes).
- afs: Fix access after dec in put functions (git-fixes).
- afs: Fix afs_getattr() to refetch file status if callback break occurred (git-fixes).
- afs: Fix dynamic root getattr (git-fixes).
- afs: Fix fileserver probe RTT handling (git-fixes).
- afs: Fix infinite loop found by xfstest generic/676 (git-fixes).
- afs: Fix lost servers_outstanding count (git-fixes).
- afs: Fix server->active leak in afs_put_server (git-fixes).
- afs: Fix setting of mtime when creating a file/dir/symlink (git-fixes).
- afs: Fix updating of i_size with dv jump from server (git-fixes).
- afs: Fix vlserver probe RTT handling (git-fixes).
- afs: Return -EAGAIN, not -EREMOTEIO, when a file already locked (git-fixes).
- afs: Use refcount_t rather than atomic_t (git-fixes).
- afs: Use the operation issue time instead of the reply time for callbacks (git-fixes).
- ALSA: emu10k1: roll up loops in DSP setup code for Audigy (git-fixes).
- ALSA: hda/realtek - remove 3k pull low procedure (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS70AU (git-fixes).
- ALSA: hda/realtek: Add support for DELL Oasis 13/14/16 laptops (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx (git-fixes).
- ALSA: hda/realtek: Fix generic fixup definition for cs35l41 amp (git-fixes).
- ALSA: hda/realtek: Support ASUS G713PV laptop (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP 250 G8 (git-fixes).
- ALSA: usb-audio: Add FIXED_RATE quirk for JBL Quantum610 Wireless (git-fixes).
- ALSA: usb-audio: Add new quirk FIXED_RATE for JBL Quantum810 Wireless (git-fixes).
- ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset (bsc#1207129).
- ALSA: usb-audio: Add quirk for Tascam Model 12 (git-fixes).
- ALSA: usb-audio: Always initialize fixed_rate in snd_usb_find_implicit_fb_sync_format() (git-fixes).
- ALSA: usb-audio: Apply mutex around snd_usb_endpoint_set_params() (git-fixes).
- ALSA: usb-audio: Avoid superfluous endpoint setup (git-fixes).
- ALSA: usb-audio: Avoid unnecessary interface change at EP close (git-fixes).
- ALSA: usb-audio: Clear fixed clock rate at closing EP (git-fixes).
- ALSA: usb-audio: Correct the return code from snd_usb_endpoint_set_params() (git-fixes).
- ALSA: usb-audio: Drop superfluous interface setup at parsing (git-fixes).
- ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate() (git-fixes).
- ALSA: usb-audio: Fix wrong kfree issue in snd_usb_endpoint_free_all (git-fixes).
- ALSA: usb-audio: More refactoring of hw constraint rules (git-fixes).
- ALSA: usb-audio: Properly refcounting clock rate (git-fixes).
- ALSA: usb-audio: Rate limit usb_set_interface error reporting (git-fixes).
- ALSA: usb-audio: Refcount multiple accesses on the single clock (git-fixes).
- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (take#2) (git-fixes).
- ALSA: usb-audio: Update for native DSD support quirks (git-fixes).
- ALSA: usb-audio: Use atomic_try_cmpxchg in ep_state_update (git-fixes).
- ALSA: usb-audio: Workaround for XRUN at prepare (git-fixes).
- amd-pstate: Fix amd_pstate mode switch (git-fixes).
- ASoC: amd: acp: fix for invalid dai id handling in acp_get_byte_count() (git-fixes).
- ASoC: atmel: Fix the 8K sample parameter in I2SC master (git-fixes).
- ASoc: codecs: ES8316: Fix DMIC config (git-fixes).
- ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).
- ASoC: codecs: wcd934x: fix resource leaks on component remove (git-fixes).
- ASoC: codecs: wcd938x: fix codec initialisation race (git-fixes).
- ASoC: codecs: wcd938x: fix dB range for HPHL and HPHR (git-fixes).
- ASoC: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).
- ASoC: codecs: wcd938x: fix soundwire initialisation race (git-fixes).
- ASoC: da7219: Check for failure reading AAD IRQ events (git-fixes).
- ASoC: da7219: Flush pending AAD IRQ when suspending (git-fixes).
- ASoC: fsl_sai: Disable bit clock with transmitter (git-fixes).
- ASoC: fsl_spdif: Silence output on stop (git-fixes).
- ASoC: rt5640: Fix sleep in atomic context (git-fixes).
- ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 (git-fixes).
- ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 (git-fixes).
- ASoC: rt711: fix for JD event handling in ClockStop Mode0 (git-fixes).
- ASoC: SOF: ipc3-dtrace: uninitialized data in dfsentry_trace_filter_write() (git-fixes).
- ASoC: tegra: Fix ADX byte map (git-fixes).
- ASoC: tegra: Fix AMX byte map (git-fixes).
- ASoC: wm8904: Fill the cache for WM8904_ADC_TEST_0 register (git-fixes).
- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).
- block, bfq: Fix division by zero error on zero wsum (bsc#1213653).
- block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).
- Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO (bsc#1210780 CVE-2023-31083).
- bpf: add missing header file include (bsc#1211738 CVE-2023-0459).
- bus: mhi: add new interfaces to handle MHI channels directly (bsc#1207948).
- bus: mhi: host: add destroy_device argument to mhi_power_down() (bsc#1207948).
- can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).
- can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).
- can: gs_usb: gs_can_close(): add missing set of CAN state to CAN_STATE_STOPPED (git-fixes).
- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).
- coda: Avoid partial allocation of sig_inputArgs (git-fixes).
- cpufreq: amd_pstate: fix wrong lowest perf fetch (bsc#1212445).
- cpufreq: amd_pstate: map desired perf into pstate scope for powersave governor (bsc#1212445).
- cpufreq: amd-pstate: Add ->fast_switch() callback (bsc#1212445).
- cpufreq: amd-pstate: Add AMD P-State frequencies attributes (bsc#1212445).
- cpufreq: amd-pstate: Add AMD P-State performance attributes (bsc#1212445).
- cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection (bsc#1212445).
- cpufreq: amd-pstate: Add boost mode support for AMD P-State (bsc#1212445).
- cpufreq: amd-pstate: add driver working mode switch support (bsc#1212445).
- cpufreq: amd-pstate: Add fast switch function for AMD P-State (bsc#1212445).
- cpufreq: amd-pstate: Add guided autonomous mode (bsc#1212445).
- cpufreq: amd-pstate: Add guided mode control support via sysfs (bsc#1212445).
- cpufreq: amd-pstate: Add more tracepoint for AMD P-State module (bsc#1212445).
- cpufreq: amd-pstate: Add resume and suspend callbacks (bsc#1212445).
- cpufreq: amd-pstate: Add trace for AMD P-State module (bsc#1212445).
- cpufreq: amd-pstate: avoid uninitialized variable use (bsc#1212445).
- cpufreq: amd-pstate: change amd-pstate driver to be built-in type (bsc#1212445).
- cpufreq: amd-pstate: convert sprintf with sysfs_emit() (bsc#1212445).
- cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at init (bsc#1212445).
- cpufreq: amd-pstate: Expose struct amd_cpudata (bsc#1212445).
- cpufreq: amd-pstate: Fix initial highest_perf value (bsc#1212445).
- cpufreq: amd-pstate: Fix invalid write to MSR_AMD_CPPC_REQ (bsc#1212445).
- cpufreq: amd-pstate: Fix Kconfig dependencies for AMD P-State (bsc#1212445).
- cpufreq: amd-pstate: fix kernel hang issue while amd-pstate unregistering (bsc#1212445).
- cpufreq: amd-pstate: Fix struct amd_cpudata kernel-doc comment (bsc#1212445).
- cpufreq: amd-pstate: fix white-space (bsc#1212445).
- cpufreq: amd-pstate: implement amd pstate cpu online and offline callback (bsc#1212445).
- cpufreq: amd-pstate: implement Pstate EPP support for the AMD processors (bsc#1212445).
- cpufreq: amd-pstate: implement suspend and resume callbacks (bsc#1212445).
- cpufreq: amd-pstate: Introduce a new AMD P-State driver to support future processors (bsc#1212445).
- cpufreq: amd-pstate: Introduce the support for the processors with shared memory solution (bsc#1212445).
- cpufreq: amd-pstate: Let user know amd-pstate is disabled (bsc#1212445).
- cpufreq: amd-pstate: Make amd-pstate EPP driver name hyphenated (bsc#1212445).
- cpufreq: amd-pstate: Make varaiable mode_state_machine static (bsc#1212445).
- cpufreq: amd-pstate: optimize driver working mode selection in amd_pstate_param() (bsc#1212445).
- cpufreq: amd-pstate: Remove fast_switch_possible flag from active driver (bsc#1212445).
- cpufreq: amd-pstate: remove MODULE_LICENSE in non-modules (bsc#1212445).
- cpufreq: amd-pstate: Set a fallback policy based on preferred_profile (bsc#1212445).
- cpufreq: amd-pstate: simplify cpudata pointer assignment (bsc#1212445).
- cpufreq: amd-pstate: Update policy->cur in amd_pstate_adjust_perf() (bsc#1212445).
- cpufreq: amd-pstate: update pstate frequency transition delay time (bsc#1212445).
- cpufreq: amd-pstate: Write CPPC enable bit per-socket (bsc#1212445).
- crypto: kpp - Add helper to set reqsize (git-fixes).
- crypto: qat - Use helper to set reqsize (git-fixes).
- dlm: fix missing lkb refcount handling (git-fixes).
- dlm: fix plock invalid read (git-fixes).
- Documentation: cpufreq: amd-pstate: Move amd_pstate param to alphabetical order (bsc#1212445).
- Documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).
- drm/amd: Fix an error handling mistake in psp_sw_init() (git-fixes).
- drm/amd/display: Add monitor specific edid quirk (git-fixes).
- drm/amd/display: Add polling method to handle MST reply packet (bsc#1213578).
- drm/amd/display: check TG is non-null before checking if enabled (git-fixes).
- drm/amd/display: Correct `DMUB_FW_VERSION` macro (git-fixes).
- drm/amd/display: Disable MPC split by default on special asic (git-fixes).
- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).
- drm/amd/display: fix seamless odm transitions (git-fixes).
- drm/amd/display: Keep PHY active for DP displays on DCN31 (git-fixes).
- drm/amd/display: only accept async flips for fast updates (git-fixes).
- drm/amd/display: Only update link settings after successful MST link train (git-fixes).
- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).
- drm/amd/display: Remove Phantom Pipe Check When Calculating K1 and K2 (git-fixes).
- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).
- drm/amd/display: Unlock on error path in dm_handle_mst_sideband_msg_ready_event() (git-fixes).
- drm/amd/pm: add abnormal fan detection for smu 13.0.0 (git-fixes).
- drm/amd/pm: conditionally disable pcie lane/speed switching for SMU13 (git-fixes).
- drm/amd/pm: re-enable the gfx imu when smu resume (git-fixes).
- drm/amd/pm: share the code around SMU13 pcie parameters update (git-fixes).
- drm/amdgpu: add the fan abnormal detection feature (git-fixes).
- drm/amdgpu: avoid restore process run into dead loop (git-fixes).
- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (git-fixes).
- drm/amdgpu: Fix minmax warning (git-fixes).
- drm/atomic: Allow vblank-enabled + self-refresh 'disable' (git-fixes).
- drm/atomic: Fix potential use-after-free in nonblocking commits (git-fixes).
- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).
- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix auxiliary bus lifetime (git-fixes).
- drm/client: Fix memory leak in drm_client_modeset_probe (git-fixes).
- drm/dp_mst: Clear MSG_RDY flag before sending new message (bsc#1213578).
- drm/i915: Do not preserve dpll_hw_state for slave crtc in Bigjoiner (git-fixes).
- drm/i915: Fix an error handling path in igt_write_huge() (git-fixes).
- drm/i915/dpt: Use shmem for dpt objects (git-fixes).
- drm/i915/tc: Fix system resume MST mode restore for DP-alt sinks (git-fixes).
- drm/msm: Fix IS_ERR_OR_NULL() vs NULL check in a5xx_submit_in_rb() (git-fixes).
- drm/msm/adreno: Fix snapshot BINDLESS_DATA size (git-fixes).
- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).
- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).
- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).
- drm/radeon: Fix integer overflow in radeon_cs_parser_init (git-fixes).
- drm/ttm: fix bulk_move corruption when adding a entry (git-fixes).
- drm/ttm: fix warning that we shouldn't mix (git-fixes).
- drm/vmwgfx: Fix Legacy Display Unit atomic drm support (bsc#1213632).
- drm/vmwgfx: Remove explicit and broken vblank handling (bsc#1213632).
- drm/vmwgfx: Remove rcu locks from user resources (bsc#1213632).
- fbdev: au1200fb: Fix missing IRQ check in au1200fb_drv_probe (git-fixes).
- fbdev: imxfb: Removed unneeded release_mem_region (git-fixes).
- fbdev: imxfb: warn about invalid left/right margin (git-fixes).
- file: always lock position for FMODE_ATOMIC_POS (bsc#1213759).
- fs: dlm: add midcomms init/start functions (git-fixes).
- fs: dlm: do not set stop rx flag after node reset (git-fixes).
- fs: dlm: filter user dlm messages for kernel locks (git-fixes).
- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).
- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).
- fs: dlm: fix race in lowcomms (git-fixes).
- fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).
- fs: dlm: move sending fin message into state change handling (git-fixes).
- fs: dlm: retry accept() until -EAGAIN or error returns (git-fixes).
- fs: dlm: return positive pid value for F_GETLK (git-fixes).
- fs: dlm: start midcomms before scand (git-fixes).
- fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() (git-fixes).
- FS: JFS: Check for read-only mounted filesystem in txBegin (git-fixes).
- FS: JFS: Fix null-ptr-deref Read in txBegin (git-fixes).
- fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev (git-fixes).
- gve: Set default duplex configuration to full (git-fixes).
- gve: unify driver name usage (git-fixes).
- hwmon: (adm1275) Allow setting sample averaging (git-fixes).
- hwmon: (k10temp) Enable AMD3255 Proc to show negative temperature (git-fixes).
- hwmon: (nct7802) Fix for temp6 (PECI1) processed even if PECI1 disabled (git-fixes).
- hwmon: (pmbus/adm1275) Fix problems with temperature monitoring on ADM1272 (git-fixes).
- i2c: xiic: Defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).
- i2c: xiic: Do not try to handle more interrupt events after error (git-fixes).
- iavf: check for removal state before IAVF_FLAG_PF_COMMS_FAILED (git-fixes).
- iavf: fix a deadlock caused by rtnl and driver's lock circular dependencies (git-fixes).
- iavf: Fix out-of-bounds when setting channels on remove (git-fixes).
- iavf: fix potential deadlock on allocation failure (git-fixes).
- iavf: fix reset task race with iavf_remove() (git-fixes).
- iavf: Fix use-after-free in free_netdev (git-fixes).
- iavf: Move netdev_update_features() into watchdog task (git-fixes).
- iavf: use internal state to free traffic IRQs (git-fixes).
- iavf: Wait for reset in callbacks which trigger it (git-fixes).
- IB/hfi1: Use bitmap_zalloc() when applicable (git-fixes)
- ice: Fix max_rate check while configuring TX rate limits (git-fixes).
- ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).
- ice: handle extts in the miscellaneous interrupt thread (git-fixes).
- igc: Check if hardware TX timestamping is enabled earlier (git-fixes).
- igc: Enable and fix RX hash usage by netstack (git-fixes).
- igc: Fix inserting of empty frame for launchtime (git-fixes).
- igc: Fix Kernel Panic during ndo_tx_timeout callback (git-fixes).
- igc: Fix launchtime before start of cycle (git-fixes).
- igc: Fix race condition in PTP tx code (git-fixes).
- igc: Handle PPS start time programming for past time values (git-fixes).
- igc: Prevent garbled TX queue with XDP ZEROCOPY (git-fixes).
- igc: Remove delay during TX ring configuration (git-fixes).
- igc: set TP bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).
- igc: Work around HW bug causing missing timestamps (git-fixes).
- Input: i8042 - add Clevo PCX0DX to i8042 quirk table (git-fixes).
- Input: iqs269a - do not poll during ATI (git-fixes).
- Input: iqs269a - do not poll during suspend or resume (git-fixes).
- io_uring: ensure IOPOLL locks around deferred work (bsc#1213272 CVE-2023-21400).
- ipv6: rpl: Fix Route of Death (CVE-2023-2156 bsc#1211131).
- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).
- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).
- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).
- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).
- jffs2: GC deadlock reading a page that is used in jffs2_write_begin() (git-fixes).
- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).
- jfs: jfs_dmap: Validate db_l2nbperpage while mounting (git-fixes).
- kabi/severities: relax kABI for ath11k local symbols (bsc#1207948)
- kselftest: vDSO: Fix accumulation of uninitialized ret when CLOCK_REALTIME is undefined (git-fixes).
- KVM: Add GDS_NO support to KVM (bsc#1206418, CVE-2022-40982).
- KVM: arm64: Do not read a HW interrupt pending state in user context (git-fixes)
- KVM: arm64: Warn if accessing timer pending state outside of vcpu (bsc#1213620)
- KVM: Do not null dereference ops->destroy (git-fixes)
- KVM: downgrade two BUG_ONs to WARN_ON_ONCE (git-fixes)
- KVM: Initialize debugfs_dentry when a VM is created to avoid NULL (git-fixes)
- KVM: s390: pv: fix index value of replaced ASCE (git-fixes bsc#1213867).
- KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0) (git-fixes).
- KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported (git-fixes).
- KVM: VMX: restore vmx_vmexit alignment (git-fixes).
- KVM: x86: Account fastpath-only VM-Exits in vCPU stats (git-fixes).
- leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename (git-fixes).
- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).
- md: add error_handlers for raid0 and linear (bsc#1212766).
- media: staging: atomisp: select V4L2_FWNODE (git-fixes).
- mhi_power_down() kABI workaround (bsc#1207948).
- mmc: core: disable TRIM on Kingston EMMC04G-M627 (git-fixes).
- mmc: sdhci: fix DMA configure compatibility issue when 64bit DMA mode is used (git-fixes).
- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).
- net: mana: Batch ringing RX queue doorbell on receiving packets (bsc#1212901).
- net: mana: Use the correct WQE count for ringing RQ doorbell (bsc#1212901).
- net: nfc: Fix use-after-free caused by nfc_llcp_find_local (bsc#1213601 CVE-2023-3863).
- net: phy: marvell10g: fix 88x3310 power up (git-fixes).
- net/mlx5: DR, Support SW created encap actions for FW table (git-fixes).
- net/mlx5e: Check for NOT_READY flag state after locking (git-fixes).
- net/mlx5e: fix double free in mlx5e_destroy_flow_table (git-fixes).
- net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create (git-fixes).
- net/mlx5e: fix memory leak in mlx5e_ptp_open (git-fixes).
- net/mlx5e: XDP, Allow growing tail for XDP multi buffer (git-fixes).
- net/mlx5e: xsk: Set napi_id to support busy polling on XSK RQ (git-fixes).
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free (CVE-2023-3776 bsc#1213588).
- net/sched: cls_u32: Fix reference counter leak leading to overflow (CVE-2023-3609 bsc#1213586).
- net/sched: sch_qfq: account for stab overhead in qfq_enqueue (CVE-2023-3611 bsc#1213585).
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).
- netfilter: nft_set_pipapo: fix improper element removal (bsc#1213812 CVE-2023-4004).
- nfc: llcp: simplify llcp_sock_connect() error paths (bsc#1213601 CVE-2023-3863).
- nfsd: add encoding of op_recall flag for write delegation (git-fixes).
- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).
- nfsd: Fix sparse warning (git-fixes).
- nfsd: Remove open coding of string copy (git-fixes).
- NFSv4.1: Always send a RECLAIM_COMPLETE after establishing lease (git-fixes).
- NFSv4.1: freeze the session table upon receiving NFS4ERR_BADSESSION (git-fixes).
- nvme-pci: fix DMA direction of unmapping integrity data (git-fixes).
- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).
- nvme: do not reject probe due to duplicate IDs for single-ported PCIe devices (git-fixes).
- nvme: fix the NVME_ID_NS_NVM_STS_MASK definition (git-fixes).
- octeontx-af: fix hardware timestamp configuration (git-fixes).
- octeontx2-af: Move validation of ptp pointer before its usage (git-fixes).
- octeontx2-pf: Add additional check for MCAM rules (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).
- PCI/PM: Avoid putting EloPOS E2/S2/H2 PCIe Ports in D3cold (git-fixes).
- phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).
- pinctrl: amd: Detect internal GPIO0 debounce handling (git-fixes).
- pinctrl: amd: Do not show Invalid config param errors (git-fixes).
- pinctrl: amd: Fix mistake in handling clearing pins at startup (git-fixes).
- pinctrl: amd: Only use special debounce behavior for GPIO 0 (git-fixes).
- pinctrl: amd: Use amd_pinconf_set() for all config options (git-fixes).
- platform/x86: msi-laptop: Fix rfkill out-of-sync on MSI Wind U100 (git-fixes).
- RDMA/bnxt_re: Fix hang during driver unload (git-fixes)
- RDMA/bnxt_re: Prevent handling any completions after qp destroy (git-fixes)
- RDMA/core: Update CMA destination address on rdma_resolve_addr (git-fixes)
- RDMA/irdma: Add missing read barriers (git-fixes)
- RDMA/irdma: Fix data race on CQP completion stats (git-fixes)
- RDMA/irdma: Fix data race on CQP request done (git-fixes)
- RDMA/irdma: Fix op_type reporting in CQEs (git-fixes)
- RDMA/irdma: Report correct WC error (git-fixes)
- RDMA/mlx4: Make check for invalid flags stricter (git-fixes)
- RDMA/mthca: Fix crash when polling CQ for shared QPs (git-fixes)
- regmap: Account for register length in SMBus I/O limits (git-fixes).
- regmap: Drop initial version of maximum transfer length fixes (git-fixes).
- relayfs: fix out-of-bounds access in relay_file_read (bsc#1212502 CVE-2023-3268).
- rxrpc, afs: Fix selection of abort codes (git-fixes).
- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).
- s390/bpf: Add expoline to tail calls (git-fixes bsc#1213870).
- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).
- s390/dasd: print copy pair message only for the correct error (git-fixes bsc#1213872).
- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).
- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).
- s390/qeth: Fix vipa deletion (git-fixes bsc#1213713).
- s390/vmem: fix empty page tables cleanup under KASAN (git-fixes bsc#1213715).
- scftorture: Count reschedule IPIs (git-fixes).
- scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected (bsc#1213756).
- scsi: lpfc: Avoid -Wstringop-overflow warning (bsc#1213756).
- scsi: lpfc: Clean up SLI-4 sysfs resource reporting (bsc#1213756).
- scsi: lpfc: Copyright updates for 14.2.0.14 patches (bsc#1213756).
- scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).
- scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).
- scsi: lpfc: Fix incorrect big endian type assignments in FDMI and VMID paths (bsc#1213756).
- scsi: lpfc: Fix lpfc_name struct packing (bsc#1213756).
- scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (bsc#1213756).
- scsi: lpfc: Pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).
- scsi: lpfc: Qualify ndlp discovery state when processing RSCN (bsc#1213756).
- scsi: lpfc: Refactor cpu affinity assignment paths (bsc#1213756).
- scsi: lpfc: Remove extra ndlp kref decrement in FLOGI cmpl for loop topology (bsc#1213756).
- scsi: lpfc: Replace all non-returning strlcpy() with strscpy() (bsc#1213756).
- scsi: lpfc: Replace one-element array with flexible-array member (bsc#1213756).
- scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).
- scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (bsc#1213756).
- scsi: lpfc: Simplify fcp_abort transport callback log message (bsc#1213756).
- scsi: lpfc: Update lpfc version to 14.2.0.14 (bsc#1213756).
- scsi: lpfc: Use struct_size() helper (bsc#1213756).
- scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).
- scsi: qla2xxx: Array index may go out of bound (bsc#1213747).
- scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).
- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).
- scsi: qla2xxx: Correct the index of array (bsc#1213747).
- scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).
- scsi: qla2xxx: Fix buffer overrun (bsc#1213747).
- scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).
- scsi: qla2xxx: Fix deletion race condition (bsc#1213747).
- scsi: qla2xxx: Fix end of loop test (bsc#1213747).
- scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).
- scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).
- scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).
- scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).
- scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).
- scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).
- scsi: qla2xxx: Fix TMF leak through (bsc#1213747).
- scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).
- scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).
- scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).
- scsi: qla2xxx: Replace one-element array with DECLARE_FLEX_ARRAY() helper (bsc#1213747).
- scsi: qla2xxx: Silence a static checker warning (bsc#1213747).
- scsi: qla2xxx: Turn off noisy message log (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).
- scsi: qla2xxx: Use vmalloc_array() and vcalloc() (bsc#1213747).
- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).
- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).
- serial: sifive: Fix sifive_serial_console_setup() section (git-fixes).
- sfc: fix crash when reading stats while NIC is resetting (git-fixes).
- sfc: fix XDP queues mode with legacy IRQ (git-fixes).
- sfc: use budget for TX completions (git-fixes).
- soundwire: qcom: update status correctly with mask (git-fixes).
- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).
- staging: r8712: Fix memory leak in _r8712_init_xmit_priv() (git-fixes).
- SUNRPC: always free ctxt when freeing deferred request (git-fixes).
- SUNRPC: double free xprt_ctxt while still in use (git-fixes).
- SUNRPC: Fix trace_svc_register() call site (git-fixes).
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (git-fixes).
- SUNRPC: Remove dead code in svc_tcp_release_rqst() (git-fixes).
- SUNRPC: remove the maximum number of retries in call_bind_status (git-fixes).
- svcrdma: Prevent page release when nothing was received (git-fixes).
- tpm_tis: Explicitly check for error code (git-fixes).
- tty: n_gsm: fix UAF in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).
- uaccess: Add speculation barrier to copy_from_user() (bsc#1211738 CVE-2023-0459).
- ubifs: Add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).
- ubifs: do_rename: Fix wrong space budget when target inode's nlink > 1 (git-fixes).
- ubifs: Error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).
- ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work (git-fixes).
- ubifs: Fix AA deadlock when setting xattr for encrypted file (git-fixes).
- ubifs: Fix build errors as symbol undefined (git-fixes).
- ubifs: Fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).
- ubifs: Fix memory leak in alloc_wbufs() (git-fixes).
- ubifs: Fix memory leak in do_rename (git-fixes).
- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).
- ubifs: Fix to add refcount once page is set private (git-fixes).
- ubifs: Fix wrong dirty space budget for dirty inode (git-fixes).
- ubifs: Free memory for tmpfile name (git-fixes).
- ubifs: Re-statistic cleaned znode count if commit failed (git-fixes).
- ubifs: Rectify space amount budget for mkdir/tmpfile operations (git-fixes).
- ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).
- ubifs: Rectify space budget for ubifs_xrename() (git-fixes).
- ubifs: Rename whiteout atomically (git-fixes).
- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).
- ubifs: rename_whiteout: Fix double free for whiteout_ui->data (git-fixes).
- ubifs: Reserve one leb for each journal head while doing budget (git-fixes).
- ubifs: setflags: Make dirtied_ino_d 8 bytes aligned (git-fixes).
- ubifs: ubifs_writepage: Mark page dirty after writing inode failed (git-fixes).
- usb: dwc2: platform: Improve error reporting for problems during .remove() (git-fixes).
- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).
- usb: dwc3: pci: skip BYT GPIO lookup table for hardwired phy (git-fixes).
- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).
- USB: serial: option: add LARA-R6 01B PIDs (git-fixes).
- usb: typec: Iterate pds array when showing the pd list (git-fixes).
- usb: typec: Set port->pd before adding device for typec_port (git-fixes).
- usb: typec: Use sysfs_emit_at when concatenating the string (git-fixes).
- usb: xhci-mtk: set the dma max_seg_size (git-fixes).
- vhost_net: revert upend_idx only on retriable error (git-fixes).
- vhost: support PACKED when setting-getting vring_base (git-fixes).
- virtio_net: Fix error unwinding of XDP initialization (git-fixes).
- virtio-net: Maintain reverse cleanup order (git-fixes).
- wifi: ath11k: add support for suspend in power down state (bsc#1207948).
- wifi: ath11k: handle irq enable/disable in several code path (bsc#1207948).
- wifi: ath11k: handle thermal device registeration together with MAC (bsc#1207948).
- wifi: ath11k: remove MHI LOOPBACK channels (bsc#1207948).
- wifi: ray_cs: Drop useless status variable in parse_addr() (git-fixes).
- wifi: ray_cs: Utilize strnlen() in parse_addr() (git-fixes).
- wl3501_cs: use eth_hw_addr_set() (git-fixes).
- x86/PVH: obtain VGA console info in Dom0 (git-fixes).
- x86/speculation: Add Kconfig option for GDS (bsc#1206418, CVE-2022-40982).
- x86/srso: Add IBPB on VMEXIT (bsc#1213287, CVE-2023-20569).
- x86/srso: Tie SBPB bit setting to microcode patch detection (bsc#1213287, CVE-2023-20569).
- xen/blkfront: Only check REQ_FUA for writes (git-fixes).
- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).
- xfs: AIL needs asynchronous CIL forcing (bsc#1211811).
- xfs: async CIL flushes need pending pushes to be made stable (bsc#1211811).
- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).
- xfs: CIL work is serialised, not pipelined (bsc#1211811).
- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).
- xfs: drop async cache flushes from CIL commits (bsc#1211811).
- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).
- xfs: move the CIL workqueue to the CIL (bsc#1211811).
- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).
- xfs: order CIL checkpoint start records (bsc#1211811).
- xfs: pass a CIL context to xlog_write() (bsc#1211811).
- xfs: rework xlog_state_do_callback() (bsc#1211811).
- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).
- xfs: separate out log shutdown callback processing (bsc#1211811).
- xfs: wait iclog complete before tearing down AIL (bsc#1211811).
- xfs: XLOG_STATE_IOERROR must die (bsc#1211811).
- xhci: Fix resume issue of some ZHAOXIN hosts (git-fixes).
- xhci: Fix TRB prefetch issue of ZHAOXIN hosts (git-fixes).
- xhci: Show ZHAOXIN xHCI root hub speed correctly (git-fixes).
Patchnames
SUSE-2023-3376,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3376,openSUSE-SLE-15.5-2023-3376
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).\n- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n- CVE-2023-3863: Fixed a use-after-free flaw in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC. This flaw allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-38409: Fixed an issue in set_con2fb_map in drivers/video/fbdev/core/fbcon.c. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info) (bsc#1213417).\n- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Add ACPI disabled check to acpi_cpc_valid() (bsc#1212445).\n- ACPI: CPPC: Add definition for undefined FADT preferred PM profile value (bsc#1212445).\n- ACPI: utils: Fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).\n- ACPI/IORT: Remove erroneous id_count check in iort_node_get_rmr_info() (git-fixes).\n- afs: Adjust ACK interpretation to try and cope with NAT (git-fixes).\n- afs: Fix access after dec in put functions (git-fixes).\n- afs: Fix afs_getattr() to refetch file status if callback break occurred (git-fixes).\n- afs: Fix dynamic root getattr (git-fixes).\n- afs: Fix fileserver probe RTT handling (git-fixes).\n- afs: Fix infinite loop found by xfstest generic/676 (git-fixes).\n- afs: Fix lost servers_outstanding count (git-fixes).\n- afs: Fix server->active leak in afs_put_server (git-fixes).\n- afs: Fix setting of mtime when creating a file/dir/symlink (git-fixes).\n- afs: Fix updating of i_size with dv jump from server (git-fixes).\n- afs: Fix vlserver probe RTT handling (git-fixes).\n- afs: Return -EAGAIN, not -EREMOTEIO, when a file already locked (git-fixes).\n- afs: Use refcount_t rather than atomic_t (git-fixes).\n- afs: Use the operation issue time instead of the reply time for callbacks (git-fixes).\n- ALSA: emu10k1: roll up loops in DSP setup code for Audigy (git-fixes).\n- ALSA: hda/realtek - remove 3k pull low procedure (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS70AU (git-fixes).\n- ALSA: hda/realtek: Add support for DELL Oasis 13/14/16 laptops (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx (git-fixes).\n- ALSA: hda/realtek: Fix generic fixup definition for cs35l41 amp (git-fixes).\n- ALSA: hda/realtek: Support ASUS G713PV laptop (git-fixes).\n- ALSA: hda/relatek: Enable Mute LED on HP 250 G8 (git-fixes).\n- ALSA: usb-audio: Add FIXED_RATE quirk for JBL Quantum610 Wireless (git-fixes).\n- ALSA: usb-audio: Add new quirk FIXED_RATE for JBL Quantum810 Wireless (git-fixes).\n- ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset (bsc#1207129).\n- ALSA: usb-audio: Add quirk for Tascam Model 12 (git-fixes).\n- ALSA: usb-audio: Always initialize fixed_rate in snd_usb_find_implicit_fb_sync_format() (git-fixes).\n- ALSA: usb-audio: Apply mutex around snd_usb_endpoint_set_params() (git-fixes).\n- ALSA: usb-audio: Avoid superfluous endpoint setup (git-fixes).\n- ALSA: usb-audio: Avoid unnecessary interface change at EP close (git-fixes).\n- ALSA: usb-audio: Clear fixed clock rate at closing EP (git-fixes).\n- ALSA: usb-audio: Correct the return code from snd_usb_endpoint_set_params() (git-fixes).\n- ALSA: usb-audio: Drop superfluous interface setup at parsing (git-fixes).\n- ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate() (git-fixes).\n- ALSA: usb-audio: Fix wrong kfree issue in snd_usb_endpoint_free_all (git-fixes).\n- ALSA: usb-audio: More refactoring of hw constraint rules (git-fixes).\n- ALSA: usb-audio: Properly refcounting clock rate (git-fixes).\n- ALSA: usb-audio: Rate limit usb_set_interface error reporting (git-fixes).\n- ALSA: usb-audio: Refcount multiple accesses on the single clock (git-fixes).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (take#2) (git-fixes).\n- ALSA: usb-audio: Update for native DSD support quirks (git-fixes).\n- ALSA: usb-audio: Use atomic_try_cmpxchg in ep_state_update (git-fixes).\n- ALSA: usb-audio: Workaround for XRUN at prepare (git-fixes).\n- amd-pstate: Fix amd_pstate mode switch (git-fixes).\n- ASoC: amd: acp: fix for invalid dai id handling in acp_get_byte_count() (git-fixes).\n- ASoC: atmel: Fix the 8K sample parameter in I2SC master (git-fixes).\n- ASoc: codecs: ES8316: Fix DMIC config (git-fixes).\n- ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).\n- ASoC: codecs: wcd934x: fix resource leaks on component remove (git-fixes).\n- ASoC: codecs: wcd938x: fix codec initialisation race (git-fixes).\n- ASoC: codecs: wcd938x: fix dB range for HPHL and HPHR (git-fixes).\n- ASoC: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).\n- ASoC: codecs: wcd938x: fix soundwire initialisation race (git-fixes).\n- ASoC: da7219: Check for failure reading AAD IRQ events (git-fixes).\n- ASoC: da7219: Flush pending AAD IRQ when suspending (git-fixes).\n- ASoC: fsl_sai: Disable bit clock with transmitter (git-fixes).\n- ASoC: fsl_spdif: Silence output on stop (git-fixes).\n- ASoC: rt5640: Fix sleep in atomic context (git-fixes).\n- ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 (git-fixes).\n- ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 (git-fixes).\n- ASoC: rt711: fix for JD event handling in ClockStop Mode0 (git-fixes).\n- ASoC: SOF: ipc3-dtrace: uninitialized data in dfsentry_trace_filter_write() (git-fixes).\n- ASoC: tegra: Fix ADX byte map (git-fixes).\n- ASoC: tegra: Fix AMX byte map (git-fixes).\n- ASoC: wm8904: Fill the cache for WM8904_ADC_TEST_0 register (git-fixes).\n- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).\n- block, bfq: Fix division by zero error on zero wsum (bsc#1213653).\n- block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).\n- Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO (bsc#1210780 CVE-2023-31083).\n- bpf: add missing header file include (bsc#1211738 CVE-2023-0459).\n- bus: mhi: add new interfaces to handle MHI channels directly (bsc#1207948).\n- bus: mhi: host: add destroy_device argument to mhi_power_down() (bsc#1207948).\n- can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).\n- can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).\n- can: gs_usb: gs_can_close(): add missing set of CAN state to CAN_STATE_STOPPED (git-fixes).\n- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).\n- coda: Avoid partial allocation of sig_inputArgs (git-fixes).\n- cpufreq: amd_pstate: fix wrong lowest perf fetch (bsc#1212445).\n- cpufreq: amd_pstate: map desired perf into pstate scope for powersave governor (bsc#1212445).\n- cpufreq: amd-pstate: Add ->fast_switch() callback (bsc#1212445).\n- cpufreq: amd-pstate: Add AMD P-State frequencies attributes (bsc#1212445).\n- cpufreq: amd-pstate: Add AMD P-State performance attributes (bsc#1212445).\n- cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection (bsc#1212445).\n- cpufreq: amd-pstate: Add boost mode support for AMD P-State (bsc#1212445).\n- cpufreq: amd-pstate: add driver working mode switch support (bsc#1212445).\n- cpufreq: amd-pstate: Add fast switch function for AMD P-State (bsc#1212445).\n- cpufreq: amd-pstate: Add guided autonomous mode (bsc#1212445).\n- cpufreq: amd-pstate: Add guided mode control support via sysfs (bsc#1212445).\n- cpufreq: amd-pstate: Add more tracepoint for AMD P-State module (bsc#1212445).\n- cpufreq: amd-pstate: Add resume and suspend callbacks (bsc#1212445).\n- cpufreq: amd-pstate: Add trace for AMD P-State module (bsc#1212445).\n- cpufreq: amd-pstate: avoid uninitialized variable use (bsc#1212445).\n- cpufreq: amd-pstate: change amd-pstate driver to be built-in type (bsc#1212445).\n- cpufreq: amd-pstate: convert sprintf with sysfs_emit() (bsc#1212445).\n- cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at init (bsc#1212445).\n- cpufreq: amd-pstate: Expose struct amd_cpudata (bsc#1212445).\n- cpufreq: amd-pstate: Fix initial highest_perf value (bsc#1212445).\n- cpufreq: amd-pstate: Fix invalid write to MSR_AMD_CPPC_REQ (bsc#1212445).\n- cpufreq: amd-pstate: Fix Kconfig dependencies for AMD P-State (bsc#1212445).\n- cpufreq: amd-pstate: fix kernel hang issue while amd-pstate unregistering (bsc#1212445).\n- cpufreq: amd-pstate: Fix struct amd_cpudata kernel-doc comment (bsc#1212445).\n- cpufreq: amd-pstate: fix white-space (bsc#1212445).\n- cpufreq: amd-pstate: implement amd pstate cpu online and offline callback (bsc#1212445).\n- cpufreq: amd-pstate: implement Pstate EPP support for the AMD processors (bsc#1212445).\n- cpufreq: amd-pstate: implement suspend and resume callbacks (bsc#1212445).\n- cpufreq: amd-pstate: Introduce a new AMD P-State driver to support future processors (bsc#1212445).\n- cpufreq: amd-pstate: Introduce the support for the processors with shared memory solution (bsc#1212445).\n- cpufreq: amd-pstate: Let user know amd-pstate is disabled (bsc#1212445).\n- cpufreq: amd-pstate: Make amd-pstate EPP driver name hyphenated (bsc#1212445).\n- cpufreq: amd-pstate: Make varaiable mode_state_machine static (bsc#1212445).\n- cpufreq: amd-pstate: optimize driver working mode selection in amd_pstate_param() (bsc#1212445).\n- cpufreq: amd-pstate: Remove fast_switch_possible flag from active driver (bsc#1212445).\n- cpufreq: amd-pstate: remove MODULE_LICENSE in non-modules (bsc#1212445).\n- cpufreq: amd-pstate: Set a fallback policy based on preferred_profile (bsc#1212445).\n- cpufreq: amd-pstate: simplify cpudata pointer assignment (bsc#1212445).\n- cpufreq: amd-pstate: Update policy->cur in amd_pstate_adjust_perf() (bsc#1212445).\n- cpufreq: amd-pstate: update pstate frequency transition delay time (bsc#1212445).\n- cpufreq: amd-pstate: Write CPPC enable bit per-socket (bsc#1212445).\n- crypto: kpp - Add helper to set reqsize (git-fixes).\n- crypto: qat - Use helper to set reqsize (git-fixes).\n- dlm: fix missing lkb refcount handling (git-fixes).\n- dlm: fix plock invalid read (git-fixes).\n- Documentation: cpufreq: amd-pstate: Move amd_pstate param to alphabetical order (bsc#1212445).\n- Documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).\n- drm/amd: Fix an error handling mistake in psp_sw_init() (git-fixes).\n- drm/amd/display: Add monitor specific edid quirk (git-fixes).\n- drm/amd/display: Add polling method to handle MST reply packet (bsc#1213578).\n- drm/amd/display: check TG is non-null before checking if enabled (git-fixes).\n- drm/amd/display: Correct `DMUB_FW_VERSION` macro (git-fixes).\n- drm/amd/display: Disable MPC split by default on special asic (git-fixes).\n- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).\n- drm/amd/display: fix seamless odm transitions (git-fixes).\n- drm/amd/display: Keep PHY active for DP displays on DCN31 (git-fixes).\n- drm/amd/display: only accept async flips for fast updates (git-fixes).\n- drm/amd/display: Only update link settings after successful MST link train (git-fixes).\n- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).\n- drm/amd/display: Remove Phantom Pipe Check When Calculating K1 and K2 (git-fixes).\n- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).\n- drm/amd/display: Unlock on error path in dm_handle_mst_sideband_msg_ready_event() (git-fixes).\n- drm/amd/pm: add abnormal fan detection for smu 13.0.0 (git-fixes).\n- drm/amd/pm: conditionally disable pcie lane/speed switching for SMU13 (git-fixes).\n- drm/amd/pm: re-enable the gfx imu when smu resume (git-fixes).\n- drm/amd/pm: share the code around SMU13 pcie parameters update (git-fixes).\n- drm/amdgpu: add the fan abnormal detection feature (git-fixes).\n- drm/amdgpu: avoid restore process run into dead loop (git-fixes).\n- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (git-fixes).\n- drm/amdgpu: Fix minmax warning (git-fixes).\n- drm/atomic: Allow vblank-enabled + self-refresh 'disable' (git-fixes).\n- drm/atomic: Fix potential use-after-free in nonblocking commits (git-fixes).\n- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).\n- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).\n- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).\n- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).\n- drm/bridge: ti-sn65dsi86: Fix auxiliary bus lifetime (git-fixes).\n- drm/client: Fix memory leak in drm_client_modeset_probe (git-fixes).\n- drm/dp_mst: Clear MSG_RDY flag before sending new message (bsc#1213578).\n- drm/i915: Do not preserve dpll_hw_state for slave crtc in Bigjoiner (git-fixes).\n- drm/i915: Fix an error handling path in igt_write_huge() (git-fixes).\n- drm/i915/dpt: Use shmem for dpt objects (git-fixes).\n- drm/i915/tc: Fix system resume MST mode restore for DP-alt sinks (git-fixes).\n- drm/msm: Fix IS_ERR_OR_NULL() vs NULL check in a5xx_submit_in_rb() (git-fixes).\n- drm/msm/adreno: Fix snapshot BINDLESS_DATA size (git-fixes).\n- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).\n- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).\n- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).\n- drm/radeon: Fix integer overflow in radeon_cs_parser_init (git-fixes).\n- drm/ttm: fix bulk_move corruption when adding a entry (git-fixes).\n- drm/ttm: fix warning that we shouldn't mix (git-fixes).\n- drm/vmwgfx: Fix Legacy Display Unit atomic drm support (bsc#1213632).\n- drm/vmwgfx: Remove explicit and broken vblank handling (bsc#1213632).\n- drm/vmwgfx: Remove rcu locks from user resources (bsc#1213632).\n- fbdev: au1200fb: Fix missing IRQ check in au1200fb_drv_probe (git-fixes).\n- fbdev: imxfb: Removed unneeded release_mem_region (git-fixes).\n- fbdev: imxfb: warn about invalid left/right margin (git-fixes).\n- file: always lock position for FMODE_ATOMIC_POS (bsc#1213759).\n- fs: dlm: add midcomms init/start functions (git-fixes).\n- fs: dlm: do not set stop rx flag after node reset (git-fixes).\n- fs: dlm: filter user dlm messages for kernel locks (git-fixes).\n- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).\n- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).\n- fs: dlm: fix race in lowcomms (git-fixes).\n- fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).\n- fs: dlm: move sending fin message into state change handling (git-fixes).\n- fs: dlm: retry accept() until -EAGAIN or error returns (git-fixes).\n- fs: dlm: return positive pid value for F_GETLK (git-fixes).\n- fs: dlm: start midcomms before scand (git-fixes).\n- fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() (git-fixes).\n- FS: JFS: Check for read-only mounted filesystem in txBegin (git-fixes).\n- FS: JFS: Fix null-ptr-deref Read in txBegin (git-fixes).\n- fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev (git-fixes).\n- gve: Set default duplex configuration to full (git-fixes).\n- gve: unify driver name usage (git-fixes).\n- hwmon: (adm1275) Allow setting sample averaging (git-fixes).\n- hwmon: (k10temp) Enable AMD3255 Proc to show negative temperature (git-fixes).\n- hwmon: (nct7802) Fix for temp6 (PECI1) processed even if PECI1 disabled (git-fixes).\n- hwmon: (pmbus/adm1275) Fix problems with temperature monitoring on ADM1272 (git-fixes).\n- i2c: xiic: Defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).\n- i2c: xiic: Do not try to handle more interrupt events after error (git-fixes).\n- iavf: check for removal state before IAVF_FLAG_PF_COMMS_FAILED (git-fixes).\n- iavf: fix a deadlock caused by rtnl and driver's lock circular dependencies (git-fixes).\n- iavf: Fix out-of-bounds when setting channels on remove (git-fixes).\n- iavf: fix potential deadlock on allocation failure (git-fixes).\n- iavf: fix reset task race with iavf_remove() (git-fixes).\n- iavf: Fix use-after-free in free_netdev (git-fixes).\n- iavf: Move netdev_update_features() into watchdog task (git-fixes).\n- iavf: use internal state to free traffic IRQs (git-fixes).\n- iavf: Wait for reset in callbacks which trigger it (git-fixes).\n- IB/hfi1: Use bitmap_zalloc() when applicable (git-fixes)\n- ice: Fix max_rate check while configuring TX rate limits (git-fixes).\n- ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).\n- ice: handle extts in the miscellaneous interrupt thread (git-fixes).\n- igc: Check if hardware TX timestamping is enabled earlier (git-fixes).\n- igc: Enable and fix RX hash usage by netstack (git-fixes).\n- igc: Fix inserting of empty frame for launchtime (git-fixes).\n- igc: Fix Kernel Panic during ndo_tx_timeout callback (git-fixes).\n- igc: Fix launchtime before start of cycle (git-fixes).\n- igc: Fix race condition in PTP tx code (git-fixes).\n- igc: Handle PPS start time programming for past time values (git-fixes).\n- igc: Prevent garbled TX queue with XDP ZEROCOPY (git-fixes).\n- igc: Remove delay during TX ring configuration (git-fixes).\n- igc: set TP bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).\n- igc: Work around HW bug causing missing timestamps (git-fixes).\n- Input: i8042 - add Clevo PCX0DX to i8042 quirk table (git-fixes).\n- Input: iqs269a - do not poll during ATI (git-fixes).\n- Input: iqs269a - do not poll during suspend or resume (git-fixes).\n- io_uring: ensure IOPOLL locks around deferred work (bsc#1213272 CVE-2023-21400).\n- ipv6: rpl: Fix Route of Death (CVE-2023-2156 bsc#1211131).\n- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).\n- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).\n- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).\n- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).\n- jffs2: GC deadlock reading a page that is used in jffs2_write_begin() (git-fixes).\n- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).\n- jfs: jfs_dmap: Validate db_l2nbperpage while mounting (git-fixes).\n- kabi/severities: relax kABI for ath11k local symbols (bsc#1207948)\n- kselftest: vDSO: Fix accumulation of uninitialized ret when CLOCK_REALTIME is undefined (git-fixes).\n- KVM: Add GDS_NO support to KVM (bsc#1206418, CVE-2022-40982).\n- KVM: arm64: Do not read a HW interrupt pending state in user context (git-fixes)\n- KVM: arm64: Warn if accessing timer pending state outside of vcpu (bsc#1213620)\n- KVM: Do not null dereference ops->destroy (git-fixes)\n- KVM: downgrade two BUG_ONs to WARN_ON_ONCE (git-fixes)\n- KVM: Initialize debugfs_dentry when a VM is created to avoid NULL (git-fixes)\n- KVM: s390: pv: fix index value of replaced ASCE (git-fixes bsc#1213867).\n- KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0) (git-fixes).\n- KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported (git-fixes).\n- KVM: VMX: restore vmx_vmexit alignment (git-fixes).\n- KVM: x86: Account fastpath-only VM-Exits in vCPU stats (git-fixes).\n- leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename (git-fixes).\n- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).\n- md: add error_handlers for raid0 and linear (bsc#1212766).\n- media: staging: atomisp: select V4L2_FWNODE (git-fixes).\n- mhi_power_down() kABI workaround (bsc#1207948).\n- mmc: core: disable TRIM on Kingston EMMC04G-M627 (git-fixes).\n- mmc: sdhci: fix DMA configure compatibility issue when 64bit DMA mode is used (git-fixes).\n- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).\n- net: mana: Batch ringing RX queue doorbell on receiving packets (bsc#1212901).\n- net: mana: Use the correct WQE count for ringing RQ doorbell (bsc#1212901).\n- net: nfc: Fix use-after-free caused by nfc_llcp_find_local (bsc#1213601 CVE-2023-3863).\n- net: phy: marvell10g: fix 88x3310 power up (git-fixes).\n- net/mlx5: DR, Support SW created encap actions for FW table (git-fixes).\n- net/mlx5e: Check for NOT_READY flag state after locking (git-fixes).\n- net/mlx5e: fix double free in mlx5e_destroy_flow_table (git-fixes).\n- net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create (git-fixes).\n- net/mlx5e: fix memory leak in mlx5e_ptp_open (git-fixes).\n- net/mlx5e: XDP, Allow growing tail for XDP multi buffer (git-fixes).\n- net/mlx5e: xsk: Set napi_id to support busy polling on XSK RQ (git-fixes).\n- net/sched: cls_fw: Fix improper refcount update leads to use-after-free (CVE-2023-3776 bsc#1213588).\n- net/sched: cls_u32: Fix reference counter leak leading to overflow (CVE-2023-3609 bsc#1213586).\n- net/sched: sch_qfq: account for stab overhead in qfq_enqueue (CVE-2023-3611 bsc#1213585).\n- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).\n- net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).\n- netfilter: nft_set_pipapo: fix improper element removal (bsc#1213812 CVE-2023-4004).\n- nfc: llcp: simplify llcp_sock_connect() error paths (bsc#1213601 CVE-2023-3863).\n- nfsd: add encoding of op_recall flag for write delegation (git-fixes).\n- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).\n- nfsd: Fix sparse warning (git-fixes).\n- nfsd: Remove open coding of string copy (git-fixes).\n- NFSv4.1: Always send a RECLAIM_COMPLETE after establishing lease (git-fixes).\n- NFSv4.1: freeze the session table upon receiving NFS4ERR_BADSESSION (git-fixes).\n- nvme-pci: fix DMA direction of unmapping integrity data (git-fixes).\n- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).\n- nvme: do not reject probe due to duplicate IDs for single-ported PCIe devices (git-fixes).\n- nvme: fix the NVME_ID_NS_NVM_STS_MASK definition (git-fixes).\n- octeontx-af: fix hardware timestamp configuration (git-fixes).\n- octeontx2-af: Move validation of ptp pointer before its usage (git-fixes).\n- octeontx2-pf: Add additional check for MCAM rules (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).\n- PCI/PM: Avoid putting EloPOS E2/S2/H2 PCIe Ports in D3cold (git-fixes).\n- phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).\n- pinctrl: amd: Detect internal GPIO0 debounce handling (git-fixes).\n- pinctrl: amd: Do not show Invalid config param errors (git-fixes).\n- pinctrl: amd: Fix mistake in handling clearing pins at startup (git-fixes).\n- pinctrl: amd: Only use special debounce behavior for GPIO 0 (git-fixes).\n- pinctrl: amd: Use amd_pinconf_set() for all config options (git-fixes).\n- platform/x86: msi-laptop: Fix rfkill out-of-sync on MSI Wind U100 (git-fixes).\n- RDMA/bnxt_re: Fix hang during driver unload (git-fixes)\n- RDMA/bnxt_re: Prevent handling any completions after qp destroy (git-fixes)\n- RDMA/core: Update CMA destination address on rdma_resolve_addr (git-fixes)\n- RDMA/irdma: Add missing read barriers (git-fixes)\n- RDMA/irdma: Fix data race on CQP completion stats (git-fixes)\n- RDMA/irdma: Fix data race on CQP request done (git-fixes)\n- RDMA/irdma: Fix op_type reporting in CQEs (git-fixes)\n- RDMA/irdma: Report correct WC error (git-fixes)\n- RDMA/mlx4: Make check for invalid flags stricter (git-fixes)\n- RDMA/mthca: Fix crash when polling CQ for shared QPs (git-fixes)\n- regmap: Account for register length in SMBus I/O limits (git-fixes).\n- regmap: Drop initial version of maximum transfer length fixes (git-fixes).\n- relayfs: fix out-of-bounds access in relay_file_read (bsc#1212502 CVE-2023-3268).\n- rxrpc, afs: Fix selection of abort codes (git-fixes).\n- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).\n- s390/bpf: Add expoline to tail calls (git-fixes bsc#1213870).\n- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).\n- s390/dasd: print copy pair message only for the correct error (git-fixes bsc#1213872).\n- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).\n- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).\n- s390/qeth: Fix vipa deletion (git-fixes bsc#1213713).\n- s390/vmem: fix empty page tables cleanup under KASAN (git-fixes bsc#1213715).\n- scftorture: Count reschedule IPIs (git-fixes).\n- scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected (bsc#1213756).\n- scsi: lpfc: Avoid -Wstringop-overflow warning (bsc#1213756).\n- scsi: lpfc: Clean up SLI-4 sysfs resource reporting (bsc#1213756).\n- scsi: lpfc: Copyright updates for 14.2.0.14 patches (bsc#1213756).\n- scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).\n- scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).\n- scsi: lpfc: Fix incorrect big endian type assignments in FDMI and VMID paths (bsc#1213756).\n- scsi: lpfc: Fix lpfc_name struct packing (bsc#1213756).\n- scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (bsc#1213756).\n- scsi: lpfc: Pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).\n- scsi: lpfc: Qualify ndlp discovery state when processing RSCN (bsc#1213756).\n- scsi: lpfc: Refactor cpu affinity assignment paths (bsc#1213756).\n- scsi: lpfc: Remove extra ndlp kref decrement in FLOGI cmpl for loop topology (bsc#1213756).\n- scsi: lpfc: Replace all non-returning strlcpy() with strscpy() (bsc#1213756).\n- scsi: lpfc: Replace one-element array with flexible-array member (bsc#1213756).\n- scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).\n- scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (bsc#1213756).\n- scsi: lpfc: Simplify fcp_abort transport callback log message (bsc#1213756).\n- scsi: lpfc: Update lpfc version to 14.2.0.14 (bsc#1213756).\n- scsi: lpfc: Use struct_size() helper (bsc#1213756).\n- scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).\n- scsi: qla2xxx: Array index may go out of bound (bsc#1213747).\n- scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).\n- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).\n- scsi: qla2xxx: Correct the index of array (bsc#1213747).\n- scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).\n- scsi: qla2xxx: Fix buffer overrun (bsc#1213747).\n- scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).\n- scsi: qla2xxx: Fix deletion race condition (bsc#1213747).\n- scsi: qla2xxx: Fix end of loop test (bsc#1213747).\n- scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).\n- scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).\n- scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).\n- scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).\n- scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).\n- scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).\n- scsi: qla2xxx: Fix TMF leak through (bsc#1213747).\n- scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).\n- scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).\n- scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).\n- scsi: qla2xxx: Replace one-element array with DECLARE_FLEX_ARRAY() helper (bsc#1213747).\n- scsi: qla2xxx: Silence a static checker warning (bsc#1213747).\n- scsi: qla2xxx: Turn off noisy message log (bsc#1213747).\n- scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).\n- scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).\n- scsi: qla2xxx: Use vmalloc_array() and vcalloc() (bsc#1213747).\n- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).\n- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).\n- serial: sifive: Fix sifive_serial_console_setup() section (git-fixes).\n- sfc: fix crash when reading stats while NIC is resetting (git-fixes).\n- sfc: fix XDP queues mode with legacy IRQ (git-fixes).\n- sfc: use budget for TX completions (git-fixes).\n- soundwire: qcom: update status correctly with mask (git-fixes).\n- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).\n- staging: r8712: Fix memory leak in _r8712_init_xmit_priv() (git-fixes).\n- SUNRPC: always free ctxt when freeing deferred request (git-fixes).\n- SUNRPC: double free xprt_ctxt while still in use (git-fixes).\n- SUNRPC: Fix trace_svc_register() call site (git-fixes).\n- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (git-fixes).\n- SUNRPC: Remove dead code in svc_tcp_release_rqst() (git-fixes).\n- SUNRPC: remove the maximum number of retries in call_bind_status (git-fixes).\n- svcrdma: Prevent page release when nothing was received (git-fixes).\n- tpm_tis: Explicitly check for error code (git-fixes).\n- tty: n_gsm: fix UAF in gsm_cleanup_mux (git-fixes).\n- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).\n- uaccess: Add speculation barrier to copy_from_user() (bsc#1211738 CVE-2023-0459).\n- ubifs: Add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).\n- ubifs: do_rename: Fix wrong space budget when target inode's nlink > 1 (git-fixes).\n- ubifs: Error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).\n- ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work (git-fixes).\n- ubifs: Fix AA deadlock when setting xattr for encrypted file (git-fixes).\n- ubifs: Fix build errors as symbol undefined (git-fixes).\n- ubifs: Fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).\n- ubifs: Fix memory leak in alloc_wbufs() (git-fixes).\n- ubifs: Fix memory leak in do_rename (git-fixes).\n- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).\n- ubifs: Fix to add refcount once page is set private (git-fixes).\n- ubifs: Fix wrong dirty space budget for dirty inode (git-fixes).\n- ubifs: Free memory for tmpfile name (git-fixes).\n- ubifs: Re-statistic cleaned znode count if commit failed (git-fixes).\n- ubifs: Rectify space amount budget for mkdir/tmpfile operations (git-fixes).\n- ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).\n- ubifs: Rectify space budget for ubifs_xrename() (git-fixes).\n- ubifs: Rename whiteout atomically (git-fixes).\n- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).\n- ubifs: rename_whiteout: Fix double free for whiteout_ui->data (git-fixes).\n- ubifs: Reserve one leb for each journal head while doing budget (git-fixes).\n- ubifs: setflags: Make dirtied_ino_d 8 bytes aligned (git-fixes).\n- ubifs: ubifs_writepage: Mark page dirty after writing inode failed (git-fixes).\n- usb: dwc2: platform: Improve error reporting for problems during .remove() (git-fixes).\n- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).\n- usb: dwc3: pci: skip BYT GPIO lookup table for hardwired phy (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- USB: serial: option: add LARA-R6 01B PIDs (git-fixes).\n- usb: typec: Iterate pds array when showing the pd list (git-fixes).\n- usb: typec: Set port->pd before adding device for typec_port (git-fixes).\n- usb: typec: Use sysfs_emit_at when concatenating the string (git-fixes).\n- usb: xhci-mtk: set the dma max_seg_size (git-fixes).\n- vhost_net: revert upend_idx only on retriable error (git-fixes).\n- vhost: support PACKED when setting-getting vring_base (git-fixes).\n- virtio_net: Fix error unwinding of XDP initialization (git-fixes).\n- virtio-net: Maintain reverse cleanup order (git-fixes).\n- wifi: ath11k: add support for suspend in power down state (bsc#1207948).\n- wifi: ath11k: handle irq enable/disable in several code path (bsc#1207948).\n- wifi: ath11k: handle thermal device registeration together with MAC (bsc#1207948).\n- wifi: ath11k: remove MHI LOOPBACK channels (bsc#1207948).\n- wifi: ray_cs: Drop useless status variable in parse_addr() (git-fixes).\n- wifi: ray_cs: Utilize strnlen() in parse_addr() (git-fixes).\n- wl3501_cs: use eth_hw_addr_set() (git-fixes).\n- x86/PVH: obtain VGA console info in Dom0 (git-fixes).\n- x86/speculation: Add Kconfig option for GDS (bsc#1206418, CVE-2022-40982).\n- x86/srso: Add IBPB on VMEXIT (bsc#1213287, CVE-2023-20569).\n- x86/srso: Tie SBPB bit setting to microcode patch detection (bsc#1213287, CVE-2023-20569).\n- xen/blkfront: Only check REQ_FUA for writes (git-fixes).\n- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).\n- xfs: AIL needs asynchronous CIL forcing (bsc#1211811).\n- xfs: async CIL flushes need pending pushes to be made stable (bsc#1211811).\n- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).\n- xfs: CIL work is serialised, not pipelined (bsc#1211811).\n- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).\n- xfs: drop async cache flushes from CIL commits (bsc#1211811).\n- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).\n- xfs: move the CIL workqueue to the CIL (bsc#1211811).\n- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).\n- xfs: order CIL checkpoint start records (bsc#1211811).\n- xfs: pass a CIL context to xlog_write() (bsc#1211811).\n- xfs: rework xlog_state_do_callback() (bsc#1211811).\n- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).\n- xfs: separate out log shutdown callback processing (bsc#1211811).\n- xfs: wait iclog complete before tearing down AIL (bsc#1211811).\n- xfs: XLOG_STATE_IOERROR must die (bsc#1211811).\n- xhci: Fix resume issue of some ZHAOXIN hosts (git-fixes).\n- xhci: Fix TRB prefetch issue of ZHAOXIN hosts (git-fixes).\n- xhci: Show ZHAOXIN xHCI root hub speed correctly (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3376,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3376,openSUSE-SLE-15.5-2023-3376", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3376-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3376-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233376-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3376-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html", }, { category: "self", summary: "SUSE Bug 1206418", url: "https://bugzilla.suse.com/1206418", }, { category: "self", summary: "SUSE Bug 1207129", url: "https://bugzilla.suse.com/1207129", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1210627", url: "https://bugzilla.suse.com/1210627", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1210825", url: "https://bugzilla.suse.com/1210825", }, { category: "self", summary: "SUSE Bug 1211131", url: "https://bugzilla.suse.com/1211131", }, { category: "self", summary: "SUSE Bug 1211738", url: "https://bugzilla.suse.com/1211738", }, { category: "self", summary: "SUSE Bug 1211811", url: "https://bugzilla.suse.com/1211811", }, { category: "self", summary: "SUSE Bug 1212445", url: "https://bugzilla.suse.com/1212445", }, { category: "self", summary: "SUSE Bug 1212502", url: "https://bugzilla.suse.com/1212502", }, { category: "self", summary: "SUSE Bug 1212604", url: "https://bugzilla.suse.com/1212604", }, { category: "self", summary: "SUSE Bug 1212766", url: "https://bugzilla.suse.com/1212766", }, { category: "self", summary: "SUSE Bug 1212901", url: "https://bugzilla.suse.com/1212901", }, { category: "self", summary: "SUSE Bug 1213167", url: "https://bugzilla.suse.com/1213167", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213287", url: "https://bugzilla.suse.com/1213287", }, { category: "self", summary: "SUSE Bug 1213304", url: "https://bugzilla.suse.com/1213304", }, { category: "self", summary: "SUSE Bug 1213417", url: "https://bugzilla.suse.com/1213417", }, { category: "self", summary: "SUSE Bug 1213578", url: "https://bugzilla.suse.com/1213578", }, { category: "self", summary: "SUSE Bug 1213585", url: "https://bugzilla.suse.com/1213585", }, { category: "self", summary: "SUSE Bug 1213586", url: "https://bugzilla.suse.com/1213586", }, { category: "self", summary: "SUSE Bug 1213588", url: "https://bugzilla.suse.com/1213588", }, { category: "self", summary: "SUSE Bug 1213601", url: "https://bugzilla.suse.com/1213601", }, { category: "self", summary: "SUSE Bug 1213620", url: "https://bugzilla.suse.com/1213620", }, { category: "self", summary: "SUSE Bug 1213632", url: "https://bugzilla.suse.com/1213632", }, { category: "self", summary: "SUSE Bug 1213653", url: "https://bugzilla.suse.com/1213653", }, { category: "self", summary: "SUSE Bug 1213713", url: "https://bugzilla.suse.com/1213713", }, { category: "self", summary: "SUSE Bug 1213715", url: "https://bugzilla.suse.com/1213715", }, { category: "self", summary: "SUSE Bug 1213747", url: "https://bugzilla.suse.com/1213747", }, { category: "self", summary: "SUSE Bug 1213756", url: "https://bugzilla.suse.com/1213756", }, { category: "self", summary: "SUSE Bug 1213759", url: "https://bugzilla.suse.com/1213759", }, { category: "self", summary: "SUSE Bug 1213777", url: "https://bugzilla.suse.com/1213777", }, { category: "self", summary: "SUSE Bug 1213810", url: "https://bugzilla.suse.com/1213810", }, { category: "self", summary: "SUSE Bug 1213812", url: "https://bugzilla.suse.com/1213812", }, { category: "self", summary: "SUSE Bug 1213856", url: "https://bugzilla.suse.com/1213856", }, { category: "self", summary: "SUSE Bug 1213857", url: "https://bugzilla.suse.com/1213857", }, { category: "self", summary: "SUSE Bug 1213863", url: "https://bugzilla.suse.com/1213863", }, { category: "self", summary: "SUSE Bug 1213867", url: "https://bugzilla.suse.com/1213867", }, { category: "self", summary: "SUSE Bug 1213870", url: "https://bugzilla.suse.com/1213870", }, { category: "self", summary: "SUSE Bug 1213871", url: "https://bugzilla.suse.com/1213871", }, { category: "self", summary: "SUSE Bug 1213872", url: "https://bugzilla.suse.com/1213872", }, { category: "self", summary: "SUSE CVE CVE-2022-40982 page", url: "https://www.suse.com/security/cve/CVE-2022-40982/", }, { category: "self", summary: "SUSE CVE CVE-2023-0459 page", url: "https://www.suse.com/security/cve/CVE-2023-0459/", }, { category: "self", summary: "SUSE CVE CVE-2023-20569 page", url: "https://www.suse.com/security/cve/CVE-2023-20569/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-2156 page", url: "https://www.suse.com/security/cve/CVE-2023-2156/", }, { category: "self", summary: "SUSE CVE CVE-2023-2166 page", url: "https://www.suse.com/security/cve/CVE-2023-2166/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-3268 page", url: "https://www.suse.com/security/cve/CVE-2023-3268/", }, { category: "self", summary: "SUSE CVE CVE-2023-3567 page", url: "https://www.suse.com/security/cve/CVE-2023-3567/", }, { category: "self", summary: "SUSE CVE CVE-2023-3609 page", url: "https://www.suse.com/security/cve/CVE-2023-3609/", }, { category: "self", summary: "SUSE CVE CVE-2023-3611 page", url: "https://www.suse.com/security/cve/CVE-2023-3611/", }, { category: "self", summary: "SUSE CVE CVE-2023-3776 page", url: "https://www.suse.com/security/cve/CVE-2023-3776/", }, { category: "self", summary: "SUSE CVE CVE-2023-38409 page", url: "https://www.suse.com/security/cve/CVE-2023-38409/", }, { category: "self", summary: "SUSE CVE CVE-2023-3863 page", url: "https://www.suse.com/security/cve/CVE-2023-3863/", }, { category: "self", summary: "SUSE CVE CVE-2023-4004 page", url: "https://www.suse.com/security/cve/CVE-2023-4004/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-08-22T15:04:29Z", generator: { date: "2023-08-22T15:04:29Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3376-1", initial_release_date: "2023-08-22T15:04:29Z", revision_history: [ { date: "2023-08-22T15:04:29Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", product: { name: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", product_id: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", product: { name: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", product_id: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.14.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.14.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.14.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2022-40982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40982", }, ], notes: [ { category: "general", text: "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40982", url: "https://www.suse.com/security/cve/CVE-2022-40982", }, { category: "external", summary: "SUSE Bug 1206418 for CVE-2022-40982", url: "https://bugzilla.suse.com/1206418", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-40982", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2022-40982", }, { cve: "CVE-2023-0459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0459", }, ], notes: [ { category: "general", text: "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0459", url: "https://www.suse.com/security/cve/CVE-2023-0459", }, { category: "external", summary: "SUSE Bug 1211738 for CVE-2023-0459", url: "https://bugzilla.suse.com/1211738", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-0459", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-0459", }, { cve: "CVE-2023-20569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20569", }, ], notes: [ { category: "general", text: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20569", url: "https://www.suse.com/security/cve/CVE-2023-20569", }, { category: "external", summary: "SUSE Bug 1213287 for CVE-2023-20569", url: "https://bugzilla.suse.com/1213287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-20569", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-2156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2156", }, ], notes: [ { category: "general", text: "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2156", url: "https://www.suse.com/security/cve/CVE-2023-2156", }, { category: "external", summary: "SUSE Bug 1211131 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211131", }, { category: "external", summary: "SUSE Bug 1211395 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "important", }, ], title: "CVE-2023-2156", }, { cve: "CVE-2023-2166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2166", }, ], notes: [ { category: "general", text: "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2166", url: "https://www.suse.com/security/cve/CVE-2023-2166", }, { category: "external", summary: "SUSE Bug 1210627 for CVE-2023-2166", url: "https://bugzilla.suse.com/1210627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-2166", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-3268", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3268", }, ], notes: [ { category: "general", text: "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3268", url: "https://www.suse.com/security/cve/CVE-2023-3268", }, { category: "external", summary: "SUSE Bug 1212502 for CVE-2023-3268", url: "https://bugzilla.suse.com/1212502", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3268", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3268", }, { cve: "CVE-2023-3567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3567", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3567", url: "https://www.suse.com/security/cve/CVE-2023-3567", }, { category: "external", summary: "SUSE Bug 1213167 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213167", }, { category: "external", summary: "SUSE Bug 1213244 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213244", }, { category: "external", summary: "SUSE Bug 1213842 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213842", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3567", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "important", }, ], title: "CVE-2023-3567", }, { cve: "CVE-2023-3609", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3609", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3609", url: "https://www.suse.com/security/cve/CVE-2023-3609", }, { category: "external", summary: "SUSE Bug 1213586 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213586", }, { category: "external", summary: "SUSE Bug 1213587 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213587", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3609", }, { cve: "CVE-2023-3611", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3611", }, ], notes: [ { category: "general", text: "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3611", url: "https://www.suse.com/security/cve/CVE-2023-3611", }, { category: "external", summary: "SUSE Bug 1213585 for CVE-2023-3611", url: "https://bugzilla.suse.com/1213585", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3611", }, { cve: "CVE-2023-3776", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3776", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3776", url: "https://www.suse.com/security/cve/CVE-2023-3776", }, { category: "external", summary: "SUSE Bug 1213588 for CVE-2023-3776", url: "https://bugzilla.suse.com/1213588", }, { category: "external", summary: "SUSE Bug 1215119 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215119", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221598", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3776", }, { cve: "CVE-2023-38409", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-38409", }, ], notes: [ { category: "general", text: "An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-38409", url: "https://www.suse.com/security/cve/CVE-2023-38409", }, { category: "external", summary: "SUSE Bug 1213417 for CVE-2023-38409", url: "https://bugzilla.suse.com/1213417", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "low", }, ], title: "CVE-2023-38409", }, { cve: "CVE-2023-3863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3863", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3863", url: "https://www.suse.com/security/cve/CVE-2023-3863", }, { category: "external", summary: "SUSE Bug 1213601 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213601", }, { category: "external", summary: "SUSE Bug 1213603 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213603", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1219704 for CVE-2023-3863", url: "https://bugzilla.suse.com/1219704", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3863", }, { cve: "CVE-2023-4004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4004", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4004", url: "https://www.suse.com/security/cve/CVE-2023-4004", }, { category: "external", summary: "SUSE Bug 1213812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1213812", }, { category: "external", summary: "SUSE Bug 1214812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1214812", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "important", }, ], title: "CVE-2023-4004", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.